Cora Borradaile

/Cora Borradaile

About Cora Borradaile

This author has not yet filled in any details.
So far Cora Borradaile has created 9 blog entries.

December 2017

Google and Facebook give your data to cops

By |2018-06-18T11:57:06+00:00December 7th, 2017|Categories: Articles, Resources, Security|Tags: , , , |

We dislike G**gle and F*c*book.  Here is one reason.

Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters.  Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]

Passwords: Best practices

By |2017-12-04T08:38:47+00:00December 4th, 2017|Categories: Security|Tags: , |

At a minimum, we recommend:

  • Using a different password for every account or login, so that if one account is compromised, only one account is compromised.
  • Strong, randomly generated passwords or passphrases that are sufficiently long to resist password attacks, such as ))FpFS#Q(%ma_+7bh> or remake.catfight.dwelled.lantern.unmasking.postnasal.
  • Complement your passwords (where possible) with 2-factor authentication […]

October 2017

Advanced GPG Email Encryption: Self-Study Guide

By |2017-10-31T12:35:30+00:00October 31st, 2017|Categories: Security|Tags: , , , |

So, you’re set up to use GPG email encryption using Thunderbird+Enigmail in one of our trainings or using our online guide.  The following exercises will help reinforce key concepts and teach you some advanced tricks.

Importing (and fingerprinting) public keys

Now that you are using GPG email encryption, you will need […]

Introduction to Digital Security for Activists (Training Slides)

By |2017-10-20T14:20:10+00:00October 20th, 2017|Categories: Security|Tags: |

Activists who do not encrypt their communications put themselves and others at risk of surveillance. Encryption is more important than ever, but also much easier to use than it once was.  We will give an overview of state-of-the-art secure communications tools, discuss trade-offs and considerations in choosing the right tools […]

Dress for the Northwest: Use layers of encryption to stay safe from unknown vulnerabilities and exploits

By |2017-10-19T11:51:03+00:00October 19th, 2017|Categories: Security|Tags: , , , |

Vulnerabilities and exploits to Internet-enabled devices are constantly being discovered (and stockpiled). This is one reason why you’ll hear us say “there is no such thing as perfect digital security” and “don’t bet your life and liberty on this [digital security] tool”. That said, there is a lot you […]

September 2017

August 2017

How to browse the web anonymously

By |2018-06-18T12:03:42+00:00August 16th, 2017|Categories: Articles, Security|Tags: , , , , , |

DreamHost, a web-host, has revealed that they are fighting the US government warrant requesting all information about every person who has visited the website www.disruptj20.org. Such information could include all subpages of disruptj20 that you surfed, how often you did so and the complete text of anything you might […]

What happens to deleted emails?

By |2017-08-07T17:32:54+00:00August 7th, 2017|Categories: Security|Tags: |

In response to a question to the Digital Security for Activists program:

How secure is it to delete email and other internet documents? Who owns the deletions– the email provider, the ISP, the owner of the server/hardware? The person/entity who wrote it? The person/entity who received it?

After deleting an email, you […]

Defend Civil Liberties!

Get the latest updates, action alerts, articles, and event invites.
  • This field is for validation purposes and should be left unchanged.