Security

November 2019

Keybase is Offering Me Free Money–Is This a Scam?

By |2020-05-09T08:23:39-07:00November 1st, 2019|Categories: Articles, Featured, News, Resources, Security|Tags: , , , , |

The short version: if you’ve been using Keybase, you’re not the only one who has received an “airdrop” of the cryptocurrency Lumens (XLM). This is nothing to worry about, and you can safely participate in it or ignore it. It’s Keybase promoting XLM, which is part of their funding […]

July 2019

Does ProtonMail Snitch?

By |2019-07-02T16:08:36-07:00July 2nd, 2019|Categories: News, Organizing Resources, Resources, Security|Tags: , , , , , |

Since this Register article was recently published, some activists are concerned about whether or not ProtonMail can be trusted.

The CLDC has expressed reservations that ProtonMail may not be the best choice for activists. Despite the worrisome recent news, ProtonMail is nevertheless a reasonable choice for encrypted email. As […]

November 2018

May 2018

March 2018

Direct Encryption

By |2022-11-28T14:52:48-08:00March 29th, 2018|Categories: Security|Tags: , , |

End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.

February 2018

January 2018

What tech can we trust?

By |2022-10-27T14:48:59-07:00January 27th, 2018|Categories: Resources, Security|Tags: , , , , |

For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.

December 2017

Google and Facebook give your data to cops

By |2019-05-16T18:18:59-07:00December 7th, 2017|Categories: Articles, Resources, Security|Tags: , , , |

We dislike G**gle and F*c*book.  Here is one reason.

Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters.  Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]

Passwords: Best practices

By |2022-10-27T14:03:20-07:00December 4th, 2017|Categories: Security|Tags: , |

If you do nothing else, use a password manager (keepassxc.org, lastpass.com, 1password.com) that is protected by a strong password — here’s a checklist and a zine to help you make one.

At a minimum, we recommend:

  • Using a different password for every account or login, so that if one account is compromised, […]

October 2017

Advanced GPG Email Encryption: Self-Study Guide

By |2022-10-27T13:51:56-07:00October 31st, 2017|Categories: Security|Tags: , , , |

So, you’re set up to use GPG email encryption using Thunderbird+Enigmail in one of our trainings or using our online guide.  The following exercises will help reinforce key concepts and teach you some advanced tricks.

Importing (and fingerprinting) public keys

Now that you are using GPG email encryption, you will need […]

Go to Top