Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cryptogame: The Guardians of the Galaxy Use End-to-End Encryption #429

Open
mozfest-bot opened this Issue Jul 31, 2018 · 3 comments

Comments

@mozfest-bot
Copy link
Collaborator

mozfest-bot commented Jul 31, 2018

[ UUID ] 2c7b6c76-2689-4063-94b3-aa6958ff8ef7

[ Session Name ] Cryptogame: The Guardians of the Galaxy Use End-to-End Encryption
[ Primary Space ] Privacy and Security
[ Secondary Space ] Web Literacy

[ Submitter's Name ] David Kohan
[ Submitter's Affiliated Organisation ] King's College London, UK

[ Other Facilitator 1's Name ] Ruba Abu-Salma
[ Other Facilitator 1's GitHub ] RAbu-Salma

[ Other Facilitator 2's Name ] Vasilios Mavroudis
[ Other Facilitator 2's GitHub ] mavroudisv

[ Other Facilitator 3's Name ] Katerina Tsarava

What will happen in your session?

Our session is essentially a collaborative game with participants. The game is based on our “gaming” framework and aims to intuitively motivate and teach complex concepts through a set of challenges. In this case, we will focus on end-to-end encryption schemes. Participants are split into 3 or 4 teams (depending on the attendance) and aim to find the password for the locked treasure-chest that is secured in the middle of the room. All communication between participants and teams happens through bottled messages that are visible to everyone (including the opposing teams). As the teams progress through the challenges, they incrementally start to use more complex schemes, eventually reconstructing some popular schemes used in real world cryptographic applications.

What is the goal or outcome of your session?

We want to motivate the use of End-to-End Encryption (EE2E), help participants create correct mental models of E2EE tools, and introduce some common encryption schemes in practice. We use Game-based learning to increase the audience engagement, especially as Data/Communication Security and Cryptography is a complex and involved topic. During the game even non-experts will build an intuition around the topic, which will be later put in practice as the players move forward to more advanced challenges, while trying to avoid leaking data to opposing teams. During the game we will study in depth only specific schemes, but we will also provide some quick intermittent slide-breaks to skim through broader areas of application to further intrigue the audience.

Time needed

90 mins

@bunnybooboo

This comment has been minimized.

Copy link

bunnybooboo commented Aug 30, 2018

Yo team!! You're coming to Mozfest!!! We're excited to accept this great proposal. Guardians of the Galaxy.. I mean COME ON 😁 we had to

Watch for emails from our team in the coming days..

@bunnybooboo bunnybooboo moved this from Accepted sessions to Location 4 - Saturday - October 27 in Privacy & Security - Draft Schedule Sep 17, 2018

@mavroudisv

This comment has been minimized.

Copy link

mavroudisv commented Oct 16, 2018

@bunnybooboo
Last week, we made some updates to our session details. They appear 100% correct here: https://guidebook.com/guide/147793/event/21682603/

Do we need to push the updates anywhere else?

@bunnybooboo

This comment has been minimized.

Copy link

bunnybooboo commented Oct 21, 2018

Well we know here at least it's fully archived. Pulled it here..

There is a treasure at the center of the galaxy and you need help. You belong to one tribe among many. But who is to be trusted? How can you communicate with your allies securely? Space is vast, but people are listening...

Our session is a collaborative game. The game aims to intuitively motivate and teach complex concepts through a set of challenges. We will focus on cryptography and secure communication schemes. All the communication between participants and teams is visible to everyone (including the opposing teams). As the teams progress through the challenges, they incrementally start to use more complex schemes, eventually reconstructing some popular ones used in real world cryptographic applications.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.