The Freedom of Information Act (FOIA) (5 U.S.C. § 552) requires agencies of the U.S. government to disclose documents and information to any person who requests such documents or information. The FOIA.gov website states: “The basic function of the Freedom of Information Act is to ensure informed citizens, vital to […]
Since this Register article was recently published, some activists are concerned about whether or not ProtonMail can be trusted.
The CLDC has expressed reservations that ProtonMail may not be the best choice for activists. Despite the worrisome recent news, ProtonMail is nevertheless a reasonable choice for encrypted email. As […]
By: CLDC Staff
Recently, the U.S. Supreme Court upheld yet another draconian interpretation of federal immigration law. In the case, Nielsen v. Preap, the question before the court was whether 8 U.S.C. § 1226(c) requires the Department of Homeland Security to take certain immigrants into custody immediately after the release […]
We are excited to offer a Fall 2019 Online Course: Bilingual Train the Trainer in Know Your Rights for the Undocumented Community in Oregon. This training is being offered online on a sliding scale basis, from $15-$250 for the 10 week class. No one turned […]
Here's what we look for in trustworthy technology: end-to-end encryption, open source code, and cross-platform support.
For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.
By: Jack Byrne, CLDC intern
In 2018, do your part to support incarcerated activists!
As we approach the end of one year and the beginning of the next, many of us are thinking about making resolutions for the […]
We dislike G**gle and F*c*book. Here is one reason.
Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters. Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]
Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw is patched, please use encrypted instant messengers like, Keybase, Wire or Signal for the most sensitive communications.