From a1873782a030dcb5fe83221ccc527ce1f147ba2c Mon Sep 17 00:00:00 2001 From: LauraHilliger Date: Thu, 19 Mar 2015 13:09:32 +0100 Subject: [PATCH] added government spy to pingkong --- WebLiteracyBasics-I/session01-pingkong.html | 3 +++ 1 file changed, 3 insertions(+) diff --git a/WebLiteracyBasics-I/session01-pingkong.html b/WebLiteracyBasics-I/session01-pingkong.html index f5f3752..63d5253 100644 --- a/WebLiteracyBasics-I/session01-pingkong.html +++ b/WebLiteracyBasics-I/session01-pingkong.html @@ -275,6 +275,9 @@

IP Addresses

They use IP addresses! Every device or computer in a network or online has an IP (or “Internet Protocol”) address. It’s like a home address - and it helps devices find each other and communicate. IP addresses have 4 sets of numbers in a string like this: 172.168.3.12
+ +

In Between Hops

+

To make the obstacle course more interesting, you might place "government spies" between hops. This resource from the EFF explains how third parties might intercept data between hops. Talk with your learners about what data is protected, what's vulnerable, and to whom.