Security

July 2019

Does ProtonMail Snitch?

By |2019-07-02T16:08:36-07:00July 2nd, 2019|Categories: News, Organizing Resources, Resources, Security|Tags: , , , , , |

Since this Register article was recently published, some activists are concerned about whether or not ProtonMail can be trusted.

The CLDC has expressed reservations that ProtonMail may not be the best choice for activists. Despite the worrisome recent news, ProtonMail is nevertheless a reasonable choice for encrypted email. As […]

November 2018

May 2018

March 2018

Direct Encryption

By |2019-05-16T18:19:00-07:00March 29th, 2018|Categories: Security|Tags: , , |

End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.

February 2018

January 2018

What tech can we trust?

By |2019-05-16T18:18:59-07:00January 27th, 2018|Categories: Resources, Security|Tags: , , , , |

For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.

December 2017

Google and Facebook give your data to cops

By |2019-05-16T18:18:59-07:00December 7th, 2017|Categories: Articles, Resources, Security|Tags: , , , |

We dislike G**gle and F*c*book.  Here is one reason.

Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters.  Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]

October 2017

Advanced GPG Email Encryption: Self-Study Guide

By |2017-10-31T12:35:30-07:00October 31st, 2017|Categories: Security|Tags: , , , |

So, you’re set up to use GPG email encryption using Thunderbird+Enigmail in one of our trainings or using our online guide.  The following exercises will help reinforce key concepts and teach you some advanced tricks.

Importing (and fingerprinting) public keys

Now that you are using GPG email encryption, you will need […]

GPG email encryption guides

By |2018-06-18T11:58:33-07:00October 29th, 2017|Categories: Resources, Security|Tags: , , , , , , , |

Security update (06/14/2018) — PGP/GPG email encryption security issues have now been fixed — please update to Thunderbird 52.8.0+ and Enigmail 2.0.7+ (for those using Apple Mail, please update to GPGTools 2018.3)

Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw […]

Load More Posts

Defend Civil Liberties!

Get the latest updates, action alerts, articles, and event invites.