michele

About michele

This author has not yet filled in any details.
So far michele has created 11 blog entries.

November 2018

Digital Security Checklist for Political Activists!

By |2018-11-13T10:13:16+00:00November 3rd, 2018|Categories: Security|Tags: , , |

Welcome to the National Lawyers Guild Law4thePeople 2018 — CLDC Digital Security resource page.

 

Tap here for a brief checklist to make a strong password! — and here is our strong password zine, all you need to help you do it

 

More details about passwords!

 

 

May 2018

March 2018

Direct Encryption

By |2018-06-15T15:34:33+00:00March 29th, 2018|Categories: Security|Tags: , , |

End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.

January 2018

What tech can we trust?

By |2018-10-05T21:52:16+00:00January 27th, 2018|Categories: Resources, Security|Tags: , , , , |

For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.

October 2017

GPG email encryption guides

By |2018-06-18T11:58:33+00:00October 29th, 2017|Categories: Resources, Security|Tags: , , , , , , , |

Security update (06/14/2018) — PGP/GPG email encryption security issues have now been fixed — please update to Thunderbird 52.8.0+ and Enigmail 2.0.7+ (for those using Apple Mail, please update to GPGTools 2018.3)

Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw […]

September 2017

Signal: Activist Best Practices

By |2018-06-18T12:02:57+00:00September 6th, 2017|Categories: Security|Tags: , , , |

Signal isn’t perfect and we’re not certain it’s designed with activists in mind–for instance, you and your friends can’t use it without all using real phone numbers. But still, Signal takes almost zero time or training and equips activists with 5-star end-to-end text, voice and video encryption with an […]

August 2017

Digital Security Action Items

By |2017-08-24T15:06:28+00:00August 24th, 2017|Categories: Security|

So our goal isn’t perfect digital security. That’s impossible what the woods are for!

But what is our goal? I say, let’s make it hard for nazis, cops, and mercenaries to get all internal movement comms and adorable puppy photos. Make it so they need Seth Green from Enemy of […]

January 2017

Security Recommendations

By |2017-01-15T14:15:50+00:00January 15th, 2017|Categories: Security|Tags: |

While there is no way to be completely immune from surveillance, following our advice below will keep you and your comrades much safer. We will be updating this page with more guidance on how to most effectively organize in an age of widespread electronic surveillance. Stay tuned!

Developing Good Digital Security Culture

By |2017-01-01T17:14:36+00:00January 1st, 2017|Categories: Security|Tags: |

Liberation-focused activists who intend to succeed in their work should expect active disruption from well-resourced State and corporate adversaries. Powerful digital organizing tools (instantaneous, global communications, social networking, GPS and digital cameras) can be readily turned against activists and systematically used to surveil and disrupt activist communities. Through our new Digital Security for Activists program, CLDC aims to provide advice and trainings to empower you to up your digital security game.

Defend Civil Liberties!

Get the latest updates, action alerts, articles, and event invites.
  • This field is for validation purposes and should be left unchanged.