Here's what we look for in trustworthy technology: end-to-end encryption, open source code, and cross-platform support.
End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.
While there is no way to be completely immune from surveillance, following our advice below will keep you and your comrades much safer. We will be updating this page with more guidance on how to most effectively organize in an age of widespread electronic surveillance. Stay tuned!
Liberation-focused activists who intend to succeed in their work should expect active disruption from well-resourced State and corporate adversaries. Powerful digital organizing tools (instantaneous, global communications, social networking, GPS and digital cameras) can be readily turned against activists and systematically used to surveil and disrupt activist communities. Through our new Digital Security for Activists program, CLDC aims to provide advice and trainings to empower you to up your digital security game.