commit 0b1d62e945bc050583c227e452e09cc3cfb31d2f
Author: Stephanie A. Whited <[email protected]>
Date: Thu Oct 31 19:11:46 2019 +0000
slight grammar and flow edits
---
content/training/risks/contents.lr | 28 ++++++++++++++--------------
1 file changed, 14 insertions(+), 14 deletions(-)
diff --git a/content/training/risks/contents.lr
b/content/training/risks/contents.lr
index c1fea57..967ab61 100644
--- a/content/training/risks/contents.lr
+++ b/content/training/risks/contents.lr
@@ -5,27 +5,27 @@ title: Risks
body:
To our knowledge, no Tor trainer has ever faced consequences as a result of
training others or speaking about Tor.
-However, in some countries and in certain circumstances, it's possible that a
simply gathering of human rights defenders could be very risky, illegal or even
subject of imprisonment, physical assaults, large fines, threats, placement on
government watch lists and targeting for surveillance.
+However, in some countries and in certain circumstances, it's possible that
simply a gathering of human rights defenders could be risky, illegal, or even
subject someone to imprisonment, physical assaults, large fines, threats,
placement on government watch lists, and targeting for surveillance.
-If you want to run a Tor training for the first time and you don't know how to
assess the political and social environment, we strongly encourage you read
this document and, in case of doubt, to reach out Tor Community Team privately.
+If you want to run a Tor training for the first time and you don't know how to
assess the political and social environment, we strongly encourage you read
this document and, in case of doubt, to reach out to the Tor Community Team
privately.
-Some of potential risks of running a digital security training are only valid
in specific contexts.
-Therefore the potential risks associated to running a Tor training depend on:
+Some potential risks of running a digital security training are only valid in
specific contexts.
+The potential risks associated with running a Tor training depend on:
1. **Your threat model.** A high-profile activist already under a lot of
surveillance, for example, might attract more attention when reaching out other
activists to run a digital security training.
-2. **The laws and regulations in the country.** Best to consult with local
lawyers and local freedom of expression organizations, and learn whether your
country has a record in prosecuting individuals engaging in similar types of
activities.
+2. **The laws and regulations in the country.** Consult with local lawyers and
local freedom of expression organizations and learn whether your country has a
record in prosecuting individuals engaging in similar types of activities.
3. **The types of training.** Not all trainings carry the same weight in terms
of potential risk.
- For example, talking about privacy on digital age might be appreciable, but
teaching how to circumvent government censorship could be a serious felony.
-4. **The audience.** Gathering university students might not attract
attention, but in case of a group of journalists working on leaked documents
about government corruption, you might need to be extra careful on how to reach
out them in a private way.
-5. **The training venue.** Running a Tor training in some spaces could expose
your participants identity.
- Ideally, you should use a private space that you can control the
participants entrance.
- Check before the training if participants are comfortable on revealing
their identity to a third party, if it's the case.
+ For example, talking about privacy in the digital age might be appreciable,
but teaching how to circumvent government censorship could be a serious felony.
+4. **The audience.** Gathering university students might not attract
attention, but if you're gathering a group of journalists working with leaked
documents about government corruption, you might need to be extra careful on
how to reach out them in a private way.
+5. **The training venue.** Running a Tor training in some spaces could expose
your participants' identities.
+ Ideally, you should use a private space where you control the participants'
entrance.
+ If the space isn't private, check before the training to find out if
participants are comfortable revealing their identity to a third party.
## Evaluating risks
Some questions you may want to answer before running a digital security
training include:
-* Has anyone in my country ever been criminalized based on their internet
activity? (This does not necessarily need to be specific to digital security
training or use of Tor)
+* Has anyone in my country ever been criminalized based on their internet
activity? (This does not necessarily need to be specific to digital security
training or use of Tor.)
* Are there laws in my country that require Internet Service Providers (ISPs)
to track my online activity?
* Is it illegal for me to access certain websites?
* Does my country prohibit me from using:
@@ -34,11 +34,11 @@ Some questions you may want to answer before running a
digital security training
Note, this is not an exhaustive list of questions.
-Additionally, while many countries do not have laws specifically prohibiting
the activity of running digital security training, the use of digital security
tools may still be criminalized in certain countries under other, broader laws.
+Additionally, while many countries do not have laws specifically prohibiting
the activity of running a digital security training, the use of digital
security tools may still be criminalized in certain countries under other,
broader laws.
For example, using Tor Browser may be viewed as illegal or anti-government
activity.
Please note that we are not lawyers, and any information we give you does not
constitute legal advice.
-Additionally, your communication with us is not protected by any legal
privilege so law enforcement may subpoena and obtain any information you give
us.
+Additionally, your communication with us is not protected by any legal
privilege, so law enforcement may subpoena and obtain any information you give
us.
However, we may be able to put you in touch with lawyers who are capable of
addressing your questions and/or concerns.
Some relevant resources include:
@@ -57,4 +57,4 @@ section: training
---
section_id: training
---
-subtitle: Things you should be aware before running a digital security training
+subtitle: Things you should be aware of before running a digital security
training.
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits