digital security tools

September 2021

ProtonMail Developments: ProtonMail provides strong message privacy, but activists need to take extra steps to ensure anonymity

By |2021-09-21T10:04:40-07:00September 20th, 2021|Categories: Articles, Featured, Info, News, Resources, Security|Tags: , , , , , |

Ever since the broadly-trusted, Switzerland-based encrypted email service ProtonMail acknowledged that it helped identify a young French climate activist, organizers have been pondering whether they should continue using ProtonMail accounts.

For the sake of solidarity, the strength of our movements, and the safety of our people, activists must never cooperate […]

June 2021

Expect the Unexpected: Secure Your Phone Against Confiscation or Loss

By |2021-06-23T20:31:24-07:00June 23rd, 2021|Categories: Articles, Featured, Featured Resources, News, Resources, Security|Tags: , , , , |

In an ideal world you never lose your phone or have it on you when risking arrest. Of course this isn’t always practical. Keeping your phone locked at all times is great protection, but some of your data could still be at risk if the cops get their hands on it. Here’s […]

January 2021

Digital Security Recommendations for 2021

By |2021-01-14T14:16:54-08:00January 14th, 2021|Categories: Articles, Info, News, Organizing Resources, Security|Tags: , , , |

TLDR: Just look for the –> arrows and do some of these things. If you only have capacity to do a few things, do one from each category, starting from the top.

Why are you making me read this?

As a movement, we’ve all been working hard together to adopt strong encryption […]

May 2020

Keybase, Zoom, and the Future of Dissident Crypto

By |2020-05-09T11:17:05-07:00May 9th, 2020|Categories: Articles, Featured, News, Resources, Security|Tags: , , , |

“I bet that wasn’t in your threat model.” So the future of Keybase, perhaps CLDC’s most capable and secure recommendation for dissident organizers, is now in doubt, because of COVID-19. Thanks, coronavirus! The story so far: Zoom became very, very popular in a very, very short time […]

December 2019

Recommendations for Secure Video and Conference Calls

By |2020-05-09T08:50:54-07:00December 6th, 2019|Categories: Articles, News, Resources, Security|Tags: , , |

PSA: Zoom shouldn’t be trusted for video/conference calls.

The short read: Should Zoom should be trusted to keep your group calls secret? Only as far as you would trust Microsoft, Google, or Facebook—as far as CLDC is concerned, not at all. If you must keep using Zoom, please make sure that […]

Private In-Person Meetings

By |2019-12-04T15:36:25-08:00December 2nd, 2019|Categories: Articles, Featured, News, Organizing Resources, Resources, Security|Tags: , , |

To cut to the chase, keeping your phone in a high-quality Faraday bag will conceal your location. This stops the State from tracking your every move, which can be really important in some situations. We recommend this one right here. You can support CLDC’s work by buying one from […]

November 2019

Keybase is Offering Me Free Money–Is This a Scam?

By |2020-05-09T08:23:39-07:00November 1st, 2019|Categories: Articles, Featured, News, Resources, Security|Tags: , , , , |

The short version: if you’ve been using Keybase, you’re not the only one who has received an “airdrop” of the cryptocurrency Lumens (XLM). This is nothing to worry about, and you can safely participate in it or ignore it. It’s Keybase promoting XLM, which is part of their funding […]

July 2019

Does ProtonMail Snitch?

By |2019-07-02T16:08:36-07:00July 2nd, 2019|Categories: News, Organizing Resources, Resources, Security|Tags: , , , , , |

Since this Register article was recently published, some activists are concerned about whether or not ProtonMail can be trusted.

The CLDC has expressed reservations that ProtonMail may not be the best choice for activists. Despite the worrisome recent news, ProtonMail is nevertheless a reasonable choice for encrypted email. As […]

May 2018

January 2018

What tech can we trust?

By |2022-10-27T14:48:59-07:00January 27th, 2018|Categories: Resources, Security|Tags: , , , , |

For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.

Title

Go to Top