Cora Borradaile

About Cora Borradaile

This author has not yet filled in any details.
So far Cora Borradaile has created 10 blog entries.

June 2021

Expect the Unexpected: Secure Your Phone Against Confiscation or Loss

By |2021-06-23T20:31:24-07:00June 23rd, 2021|Categories: Articles, Featured, Featured Resources, News, Resources, Security|Tags: , , , , |

In an ideal world you never lose your phone or have it on you when risking arrest. Of course this isn’t always practical. Keeping your phone locked at all times is great protection, but some of your data could still be at risk if the cops get their hands on it. Here’s […]

December 2017

Google and Facebook give your data to cops

By |2019-05-16T18:18:59-07:00December 7th, 2017|Categories: Articles, Resources, Security|Tags: , , , |

We dislike G**gle and F*c*book.  Here is one reason.

Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters.  Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]

Passwords: Best practices

By |2022-10-27T14:03:20-07:00December 4th, 2017|Categories: Security|Tags: , |

If you do nothing else, use a password manager (,, that is protected by a strong password — here’s a checklist and a zine to help you make one.

At a minimum, we recommend:

  • Using a different password for every account or login, so that if one account is compromised, […]

October 2017

Advanced GPG Email Encryption: Self-Study Guide

By |2022-10-27T13:51:56-07:00October 31st, 2017|Categories: Security|Tags: , , , |

So, you’re set up to use GPG email encryption using Thunderbird+Enigmail in one of our trainings or using our online guide.  The following exercises will help reinforce key concepts and teach you some advanced tricks.

Importing (and fingerprinting) public keys

Now that you are using GPG email encryption, you will need […]

Introduction to Digital Security for Activists (Training Slides)

By |2021-10-12T12:41:04-07:00October 20th, 2017|Categories: Security|Tags: |

Activists who do not encrypt their communications put themselves and others at risk of surveillance. Encryption is more important than ever, but also much easier to use than it once was.  We will give an overview of state-of-the-art secure communications tools, discuss trade-offs and considerations in choosing the right tools […]

Dress for the Northwest: Use Layers of Encryption to Stay Safe from Unknown Vulnerabilities and Exploits

By |2019-11-04T19:07:11-08:00October 19th, 2017|Categories: Security|Tags: , , , |

Vulnerabilities and exploits to Internet-enabled devices are constantly being discovered (and stockpiled). This is one reason why you’ll hear us say “there is no such thing as perfect digital security” and “don’t bet your life and liberty on this [digital security] tool”. That said, there is a lot you […]

September 2017

August 2017

How to Browse the Web Anonymously

By |2019-11-04T19:08:04-08:00August 16th, 2017|Categories: Articles, Security|Tags: , , , , , |

DreamHost, a web-host, has revealed that they are fighting the US government warrant requesting all information about every person who has visited the website Such information could include all subpages of disruptj20 that you surfed, how often you did so and the complete text of anything you might […]

What happens to deleted emails?

By |2017-08-07T17:32:54-07:00August 7th, 2017|Categories: Security|Tags: |

In response to a question to the Digital Security for Activists program:

How secure is it to delete email and other internet documents? Who owns the deletions– the email provider, the ISP, the owner of the server/hardware? The person/entity who wrote it? The person/entity who received it?

After deleting an email, you […]


Go to Top