Choose Wire for conference calls
Here's what we look for in trustworthy technology: end-to-end encryption, open source code, and cross-platform support.
Here's what we look for in trustworthy technology: end-to-end encryption, open source code, and cross-platform support.
End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.
For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.
We dislike G**gle and F*c*book. Here is one reason.
Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters. Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]
If you do nothing else, use a password manager (keepassxc.org, lastpass.com, 1password.com) that is protected by a strong password — here’s a checklist and a zine to help you make one.
At a minimum, we recommend:
So, you’re set up to use GPG email encryption using Thunderbird+Enigmail in one of our trainings or using our online guide. The following exercises will help reinforce key concepts and teach you some advanced tricks.
Now that you are using GPG email encryption, you will need […]
Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw is patched, please use encrypted instant messengers like, Keybase, Wire or Signal for the most sensitive communications.
We recommend people use End-to-End Encrypted communications whenever possible […]
Activists who do not encrypt their communications put themselves and others at risk of surveillance. Encryption is more important than ever, but also much easier to use than it once was. We will give an overview of state-of-the-art secure communications tools, discuss trade-offs and considerations in choosing the right tools […]
Vulnerabilities and exploits to Internet-enabled devices are constantly being discovered (and stockpiled). This is one reason why you’ll hear us say “there is no such thing as perfect digital security” and “don’t bet your life and liberty on this [digital security] tool”. That said, there is a lot you […]