Because the behavior of telecommunications networks and the internet is so foundational to realistic threat modeling, this section should be used before any subsequent discussion of chat tools designed to protect network-level communication like Signal, or tools that encrypt and tunnel traffic, such as VPNs, or Tor. This section opens with some visuals to help illustrate how the internet works. It will afterward be primarily discussion focused, dealing with the visibility of browsing data when visiting websites.
It might sound obvious, but it's important to understand how the data can be seen by third parties that you use every day (e.g., internet service provider, telephone company) so that students can craft effective responses to security threats they'll see in the wild.
(This session will be discussion-focused)