<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>THING2THING &#187; The Australian Greens</title>
	<atom:link href="http://thing2thing.com/?feed=rss2&#038;tag=the-australian-greens" rel="self" type="application/rss+xml" />
	<link>http://thing2thing.com</link>
	<description>A History of Wikileaks</description>
	<lastBuildDate>Sat, 25 Apr 2026 04:33:14 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0.3</generator>
		<item>
		<title>Cryptoparty Like It&#8217;s 1984 &#8211; Love is Security</title>
		<link>http://thing2thing.com/?p=5021</link>
		<comments>http://thing2thing.com/?p=5021#comments</comments>
		<pubDate>Wed, 25 Mar 2015 12:31:37 +0000</pubDate>
		<dc:creator>CaTⓋ</dc:creator>
				<category><![CDATA[ANONYMOUS]]></category>
		<category><![CDATA[EDITORIAL]]></category>
		<category><![CDATA[GEEK]]></category>
		<category><![CDATA[LIVING PROOF]]></category>
		<category><![CDATA[NEWS]]></category>
		<category><![CDATA[1984]]></category>
		<category><![CDATA[ASD]]></category>
		<category><![CDATA[ASIO]]></category>
		<category><![CDATA[CRYPTOPARTY]]></category>
		<category><![CDATA[Dan Bryant]]></category>
		<category><![CDATA[George Brandis]]></category>
		<category><![CDATA[GreensNSW]]></category>
		<category><![CDATA[Jamie Parker]]></category>
		<category><![CDATA[Jenny Leong]]></category>
		<category><![CDATA[Metadata retention]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Senator Scott Ludlam]]></category>
		<category><![CDATA[The Australian Greens]]></category>
		<category><![CDATA[TPP]]></category>
		<category><![CDATA[Trans Pacific Partnership]]></category>

		<guid isPermaLink="false">http://thing2thing.com/?p=5021</guid>
		<description><![CDATA[An evening of learning, proposed by Federal Greens Senator Scott Ludlam, to keep us safe online. And what an excellent job Dan Bryant did of making both the why and the how clear in his workshop. Dan is a 'conscientious objector' systems engineer from the private sector, who joined the Greens to help refugees and keep the internet a fair playing field.  https://www.youtube.com/watch?v=TEvO2jtGaSQ&#038;list=PLto4JJ09vtzWBvwzJvuH76dRjtRjB0BdH <a class="more-link" href="http://thing2thing.com/?p=5021">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p><iframe width="650" height="366" src="https://www.youtube.com/embed/TEvO2jtGaSQ?list=PLto4JJ09vtzWBvwzJvuH76dRjtRjB0BdH" frameborder="0" allowfullscreen></iframe></p>
<p>An evening of learning, proposed by Federal Greens <a href="http://scott-ludlam.greensmps.org.au/"><target="blank"><strong><span style="color: #f10000;">Senator Scott Ludlam</span></strong></a>, to keep us safe online. And what an excellent job Dan Bryant did of making both the why and the how clear in his workshop. Dan is a &#8216;conscientious objector&#8217; systems engineer from the private sector, who joined the Greens to help refugees and keep the internet a fair playing field. </p>
<div id="attachment_5032" class="wp-caption aligncenter" style="width: 660px"><a href="http://thing2thing.com/wp-content/uploads/CRYPTOPARTY-Part2-HOW-TO-Dan.jpg"><img src="http://thing2thing.com/wp-content/uploads/CRYPTOPARTY-Part2-HOW-TO-Dan.jpg" alt="" title="CRYPTOPARTY LIKE IT&#039;S 1984 systems engineer and tutor - DAN BRYANT" width="650" height="366" class="size-full wp-image-5032" /></a><p class="wp-caption-text">CRYPTOPARTY LIKE IT'S 1984 systems engineer and tutor - DAN BRYANT</p></div>
<p>The <a href="http://nsw2015.greens.org.au/crypto"><target="blank"><strong><span style="color: #f10000;">&#8216;Cryptoparty Like It&#8217;s 1984&#8242;</span></strong></a></strong> event is in 4 parts, and I&#8217;ve documented that into 3 films; the fourth being an interaction with the audience (whom I did not film for the entirety of the evening). The first is a preamble from Greens MP Jamie Parker and Senator Scott Ludlam; the second a cyber-security work-shop; and the third a Q&#038;A with Ludlam and NSW Greens Candidate for Newtown, Jenny Leong.</p>
<p><a href="http://thing2thing.com/wp-content/uploads/CRYPTOPARTY-Part1-LUDLAM_650.jpg"><img src="http://thing2thing.com/wp-content/uploads/CRYPTOPARTY-Part1-LUDLAM_650.jpg" alt="" title="CRYPTOPARTY LIKE IT'S 1984 - Scott Ludlam, Jenny Leong and Jamie Parker" width="650" height="366" class="aligncenter size-full wp-image-5033" /></a></p>
<p>Aussie, Aussie, Aussies&#8230; whether or not you like knights and dames, methinks it&#8217;s time to castle. With both major parties bull-dozing their way into our private lives, with the <a href="http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r5375"><target="blank"><strong><span style="color: #f10000;">Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2015</span></strong></a>, on *someone&#8217;s* behalf, the sensible reaction is to don the Invisibility Cloak. Go Dark! This trove of Australian metadata will likely become a target for penetration and theft world-wide; so best not to allow one&#8217;s own data-set to become vulnerable. Hell knows they haven&#8217;t thought it through about how to compensate us, if we all get robbed.</p>
<p><div id="attachment_5037" class="wp-caption aligncenter" style="width: 660px"><a href="http://thing2thing.com/wp-content/uploads/CRYPTOPARTY-Part2-HOW-TO-encrypted.jpg"><img src="http://thing2thing.com/wp-content/uploads/CRYPTOPARTY-Part2-HOW-TO-encrypted.jpg" alt="" title="CRYPTOPARTY LIKE IT'S 1984 - Part2 - How TOR works" width="650" height="366" class="size-full wp-image-5037" /></a><p class="wp-caption-text">CRYPTOPARTY LIKE IT'S 1984 - Dan explains how TOR works</p></div><br />
<br />
It&#8217;s been suggested that the invasion of <strong>everyone&#8217;s</strong> private correspondence, without a warrant, is in the interest of &#8216;national security&#8217; and fighting crime. It&#8217;s been pointed out that metadata retention provides &#8216;evidence&#8217; to sue you, for downloading &#8216;Game of Thrones&#8217;. Big Pharma might also be on your back one day, post-TPP, for buying your medication at a cheaper price online. </p>
<p>What I fear is that global surveillance provides a means for a global elite, to learn the &#8216;Deepest Secret Fear&#8217; of any opponent; and to thwart their every move in advance. Metadata essentially monitors networks of communications, not just individuals; so this power extends over groups of all kinds, be it political parties, unions, journalists or activists defending their water supplies and farmlands.</p>
<p><a href="https://tor.eff.org/projects/torbrowser.html.en"><target="blank"><img src="http://thing2thing.com/wp-content/uploads/CRYPTOPARTY-Part2-HOW-TOR-650.jpg" alt="" title="CRYPTOPARTY-Part2-HOW-TOR-650" width="650" height="366" class="aligncenter size-full wp-image-5038" /></a> </p>
<p>The Greens are the only large political party opposing this &#8216;accident waiting to happen&#8217; / totalitarian-corporate take-over.  Senator Ludlam has decided to spread the word, far and wide, on how to really protect Australia. Every technique you learn in this workshop is entirely legal, and safe for use. If you can get yourself a decent VPN (virtual private network), it may even speed up your internet connection.</p>
<p><iframe width="650" height="366" src="https://www.youtube.com/embed/bPrZFJKIeOM" frameborder="0" allowfullscreen></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://thing2thing.com/?feed=rss2&amp;p=5021</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
