In an ideal world you never lose your phone or have it on you when risking arrest. Of course this isn’t always practical. Keeping your phone locked at all times is great protection, but some of your data could still be at risk if the cops get their hands on it. Here’s […]
TLDR: Just look for the –> arrows and do some of these things. If you only have capacity to do a few things, do one from each category, starting from the top.
Why are you making me read this?
As a movement, we’ve all been working hard together to adopt strong encryption […]
PSA: Zoom shouldn’t be trusted for video/conference calls.
The short read: Should Zoom should be trusted to keep your group calls secret? Only as far as you would trust Microsoft, Google, or Facebook—as far as CLDC is concerned, not at all. If you must keep using Zoom, please make sure that […]
Since this Register article was recently published, some activists are concerned about whether or not ProtonMail can be trusted.
The CLDC has expressed reservations that ProtonMail may not be the best choice for activists. Despite the worrisome recent news, ProtonMail is nevertheless a reasonable choice for encrypted email. As […]
Here's what we look for in trustworthy technology: end-to-end encryption, open source code, and cross-platform support.
End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.