Overview
Comment:clarify homework assignment in week 4
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA3-256: 4d908425f5f3f7a4951c678b04e4de42d120f2953134b9917281050c8f18342e
User & Date: jboy on 2021-04-07 19:36:53
Other Links: manifest | tags
Context
2021-04-08
10:31
add to homework in week 2 check-in: 3519ced7cc user: jboy tags: trunk
2021-04-07
19:36
clarify homework assignment in week 4 check-in: 4d908425f5 user: jboy tags: trunk
19:36
add assigned readings for weeks 2 and 3 check-in: 3e4193e66a user: jboy tags: trunk
Changes

Modified docs/weeks/4.md from [2dff9f2706] to [e8f7ebe53e].

1
2
3
4
5
6
7
8
9
10
11
12
13
14
# Week 4

**No lecture this week.**

## Tutorial

Homework
: - Come up with a fictional research scenario and complete the [EFF risk assessment](https://ssd.eff.org/en/module/your-security-plan) for that hypothetical scenario. Think about what skills or tools you would need to mitigate the risks you identified.
- Browse some of the following resources to help you choose a topic for your second assignment:
    - <https://defendourmovements.org/resources/>
    - <https://myshadow.org/>
    - <https://securityinabox.org/en/>

During tutorials, you will discuss and plan the [second assignment](../assignments/2.md). This will require forming groups with two or three other students in your tutorial group and coming up with a contribution to the Hacking Ethnography collection.








|





1
2
3
4
5
6
7
8
9
10
11
12
13
14
# Week 4

**No lecture this week.**

## Tutorial

Homework
: - Come up with a fictional research scenario and complete the [EFF risk assessment](https://ssd.eff.org/en/module/your-security-plan) for that hypothetical scenario. Think about what skills or tools you would need to mitigate the risks you identified.
- Browse some of the following resources and write down a few ideas for what you would like to work on for your second assignment:
    - <https://defendourmovements.org/resources/>
    - <https://myshadow.org/>
    - <https://securityinabox.org/en/>

During tutorials, you will discuss and plan the [second assignment](../assignments/2.md). This will require forming groups with two or three other students in your tutorial group and coming up with a contribution to the Hacking Ethnography collection.