Security

October 2017

GPG email encryption guides

By |2022-04-20T11:17:41-07:00October 29th, 2017|Categories: Resources, Security|Tags: , , , , , , , |

Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw is patched, please use encrypted instant messengers like, Keybase, Wire or Signal for the most sensitive communications.

We recommend people use End-to-End Encrypted communications whenever possible […]

Introduction to Digital Security for Activists (Training Slides)

By |2021-10-12T12:41:04-07:00October 20th, 2017|Categories: Security|Tags: |

Activists who do not encrypt their communications put themselves and others at risk of surveillance. Encryption is more important than ever, but also much easier to use than it once was.  We will give an overview of state-of-the-art secure communications tools, discuss trade-offs and considerations in choosing the right tools […]

Dress for the Northwest: Use Layers of Encryption to Stay Safe from Unknown Vulnerabilities and Exploits

By |2019-11-04T19:07:11-08:00October 19th, 2017|Categories: Security|Tags: , , , |

Vulnerabilities and exploits to Internet-enabled devices are constantly being discovered (and stockpiled). This is one reason why you’ll hear us say “there is no such thing as perfect digital security” and “don’t bet your life and liberty on this [digital security] tool”. That said, there is a lot you […]

September 2017

August 2017

Digital Security Action Items

By |2017-08-24T15:06:28-07:00August 24th, 2017|Categories: Security|

So our goal isn’t perfect digital security. That’s impossible what the woods are for!

But what is our goal? I say, let’s make it hard for nazis, cops, and mercenaries to get all internal movement comms and adorable puppy photos. Make it so they need Seth Green from Enemy of […]

How to Browse the Web Anonymously

By |2019-11-04T19:08:04-08:00August 16th, 2017|Categories: Articles, Security|Tags: , , , , , |

DreamHost, a web-host, has revealed that they are fighting the US government warrant requesting all information about every person who has visited the website www.disruptj20.org. Such information could include all subpages of disruptj20 that you surfed, how often you did so and the complete text of anything you might […]

What happens to deleted emails?

By |2017-08-07T17:32:54-07:00August 7th, 2017|Categories: Security|Tags: |

In response to a question to the Digital Security for Activists program:

How secure is it to delete email and other internet documents? Who owns the deletions– the email provider, the ISP, the owner of the server/hardware? The person/entity who wrote it? The person/entity who received it?

After deleting an email, you […]

Go to Top