Outrun the Bear: ProtonMail is Not for Activists
Here, we take a look at easy-to-use ProtonMail -- and why we at the CLDC can't recommend it (or its security model) for people opposing the powerful.
Here, we take a look at easy-to-use ProtonMail -- and why we at the CLDC can't recommend it (or its security model) for people opposing the powerful.
Short of meeting face-to-face with a person you really know, it is sometimes impossible to know if the person you are communicating with is who you think it is.
Signal isn’t perfect and we’re not certain it’s designed with activists in mind–for instance, you and your friends can’t use it without all using real phone numbers. But still, Signal takes almost zero time or training and equips activists with 5-star end-to-end text, voice and video encryption with an […]
Doxing is the practice of collecting personal info (public or private) and publishing it online. It has been used as a means of intimidation and harassment and CLDC has been asked more than once "what if it happens to me?"
So our goal isn’t perfect digital security. That’s impossible what the woods are for!
But what is our goal? I say, let’s make it hard for nazis, cops, and mercenaries to get all internal movement comms and adorable puppy photos. Make it so they need Seth Green from Enemy of […]
DreamHost, a web-host, has revealed that they are fighting the US government warrant requesting all information about every person who has visited the website www.disruptj20.org. Such information could include all subpages of disruptj20 that you surfed, how often you did so and the complete text of anything you might […]
In response to a question to the Digital Security for Activists program:
How secure is it to delete email and other internet documents? Who owns the deletions– the email provider, the ISP, the owner of the server/hardware? The person/entity who wrote it? The person/entity who received it?
After deleting an email, you […]
While there is no way to be completely immune from surveillance, following our advice below will keep you and your comrades much safer. We will be updating this page with more guidance on how to most effectively organize in an age of widespread electronic surveillance. Stay tuned!
Liberation-focused activists who intend to succeed in their work should expect active disruption from well-resourced State and corporate adversaries. Powerful digital organizing tools (instantaneous, global communications, social networking, GPS and digital cameras) can be readily turned against activists and systematically used to surveil and disrupt activist communities. Through our new Digital Security for Activists program, CLDC aims to provide advice and trainings to empower you to up your digital security game.