About

Self employed Linux-Projects since 2003

Planning and Setup of server environments for small / medium enterprises: 

Skills

Controlling and supervising projects from the first contact to the installation and release:

Methods we utilize

Security in a box (Tactical Tech and Frontline Defenders): printed and online. 13 languages. Aimed at beginning users. Includes how-to booklet, Hands-on guides, and glossary. Sections can be remixed: security in context: tools and tactics for the LGBT community in the Arabic region. 

Me and My Shadow uses the shadow metaphor to help beginning users understand their “digital shadow” or “digital footprint” and minimize it. Includes “trace my shadow” interactive tool which lets you investigate the traces you have left through the use of your applications and devices. Gives tips for “taking control of your information” and “turning the tables.”

Linux Hardening At its core, hardening is reducing the ways in which your system can be attacked. Under some threat models, the attack surface presented by a specific program may be too large to be acceptable.

Cryptoparty Handbook Crowdsources. Low tech. Requires background in technology. Used in tandem with cryptoparties, where people show each other how to use Tor, OTR, PGP.