digital security tools

December 2019

Recommendations for Secure Video and Conference Calls

By |2019-12-06T18:41:11-08:00December 6th, 2019|Categories: Articles, News, Resources, Security|Tags: , , |

PSA: Zoom shouldn’t be trusted for video/conference calls.

The short read: Should Zoom should be trusted to keep your group calls secret? Only as far as you would trust Microsoft, Google, or Facebook—as far as CLDC is concerned, not at all. If you must keep using Zoom, please make sure that […]

Private In-Person Meetings

By |2019-12-04T15:36:25-08:00December 2nd, 2019|Categories: Articles, Featured, News, Organizing Resources, Resources, Security|Tags: , , |

To cut to the chase, keeping your phone in a high-quality Faraday bag will conceal your location. This stops the State from tracking your every move, which can be really important in some situations. We recommend this one right here. You can support CLDC’s work by buying one from […]

November 2019

Keybase is Offering Me Free Money–Is This a Scam?

By |2019-11-01T15:59:46-07:00November 1st, 2019|Categories: Articles, Featured, News, Resources, Security|Tags: , , , , |

The short version: if you’ve been using Keybase, you’re not the only one who has received an “airdrop” of the cryptocurrency Lumens (XLM). This is nothing to worry about, and you can safely participate in it or ignore it. It’s Keybase promoting XLM, which is part of their funding […]

July 2019

Does ProtonMail Snitch?

By |2019-07-02T16:08:36-07:00July 2nd, 2019|Categories: News, Organizing Resources, Resources, Security|Tags: , , , , , |

Since this Register article was recently published, some activists are concerned about whether or not ProtonMail can be trusted.

The CLDC has expressed reservations that ProtonMail may not be the best choice for activists. Despite the worrisome recent news, ProtonMail is nevertheless a reasonable choice for encrypted email. As […]

May 2018

January 2018

What tech can we trust?

By |2019-05-16T18:18:59-07:00January 27th, 2018|Categories: Resources, Security|Tags: , , , , |

For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.

September 2017

Signal: Activist Best Practices

By |2018-06-18T12:02:57-07:00September 6th, 2017|Categories: Security|Tags: , , , |

Signal isn’t perfect and we’re not certain it’s designed with activists in mind–for instance, you and your friends can’t use it without all using real phone numbers. But still, Signal takes almost zero time or training and equips activists with 5-star end-to-end text, voice and video encryption with an […]

Defend Civil Liberties!

Get the latest updates, action alerts, articles, and event invites.