Security

May 2018

March 2018

Direct Encryption

By |2022-11-28T14:52:48-08:00March 29th, 2018|Categories: Security|Tags: , , |

End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.

February 2018

January 2018

What tech can we trust?

By |2022-10-27T14:48:59-07:00January 27th, 2018|Categories: Resources, Security|Tags: , , , , |

For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.

December 2017

Google and Facebook give your data to cops

By |2019-05-16T18:18:59-07:00December 7th, 2017|Categories: Articles, Resources, Security|Tags: , , , |

We dislike G**gle and F*c*book.  Here is one reason.

Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters.  Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]

Passwords: Best practices

By |2022-10-27T14:03:20-07:00December 4th, 2017|Categories: Security|Tags: , |

If you do nothing else, use a password manager (keepassxc.org, lastpass.com, 1password.com) that is protected by a strong password — here’s a checklist and a zine to help you make one.

At a minimum, we recommend:

  • Using a different password for every account or login, so that if one account is compromised, […]

October 2017

Advanced GPG Email Encryption: Self-Study Guide

By |2022-10-27T13:51:56-07:00October 31st, 2017|Categories: Security|Tags: , , , |

So, you’re set up to use GPG email encryption using Thunderbird+Enigmail in one of our trainings or using our online guide.  The following exercises will help reinforce key concepts and teach you some advanced tricks.

Importing (and fingerprinting) public keys

Now that you are using GPG email encryption, you will need […]

GPG email encryption guides

By |2022-04-20T11:17:41-07:00October 29th, 2017|Categories: Resources, Security|Tags: , , , , , , , |

Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw is patched, please use encrypted instant messengers like, Keybase, Wire or Signal for the most sensitive communications.

We recommend people use End-to-End Encrypted communications whenever possible […]

Introduction to Digital Security for Activists (Training Slides)

By |2021-10-12T12:41:04-07:00October 20th, 2017|Categories: Security|Tags: |

Activists who do not encrypt their communications put themselves and others at risk of surveillance. Encryption is more important than ever, but also much easier to use than it once was.  We will give an overview of state-of-the-art secure communications tools, discuss trade-offs and considerations in choosing the right tools […]

Dress for the Northwest: Use Layers of Encryption to Stay Safe from Unknown Vulnerabilities and Exploits

By |2019-11-04T19:07:11-08:00October 19th, 2017|Categories: Security|Tags: , , , |

Vulnerabilities and exploits to Internet-enabled devices are constantly being discovered (and stockpiled). This is one reason why you’ll hear us say “there is no such thing as perfect digital security” and “don’t bet your life and liberty on this [digital security] tool”. That said, there is a lot you […]

Title

Go to Top