digital security

March 2018

Direct Encryption

By |2022-11-28T14:52:48-08:00March 29th, 2018|Categories: Security|Tags: , , |

End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.

December 2017

Google and Facebook give your data to cops

By |2019-05-16T18:18:59-07:00December 7th, 2017|Categories: Articles, Resources, Security|Tags: , , , |

We dislike G**gle and F*c*book.  Here is one reason.

Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters.  Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]

October 2017

GPG email encryption guides

By |2022-04-20T11:17:41-07:00October 29th, 2017|Categories: Resources, Security|Tags: , , , , , , , |

Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw is patched, please use encrypted instant messengers like, Keybase, Wire or Signal for the most sensitive communications.

We recommend people use End-to-End Encrypted communications whenever possible […]

August 2017

Take Yourselves Seriously: Document Retention and Destruction Policies

By |2017-09-06T11:06:34-07:00August 30th, 2017|Categories: Articles, News|Tags: , , , , |

In light of the CLDC’s desire to educate activists and organizations regarding law-related topics, we will be presenting a series of informational primers that are particularly important in times of government repression and corporate attacks on dissent.  This series, “Take Yourself Seriously” will provide best practices for nonprofits, activist […]

How to Browse the Web Anonymously

By |2019-11-04T19:08:04-08:00August 16th, 2017|Categories: Articles, Security|Tags: , , , , , |

DreamHost, a web-host, has revealed that they are fighting the US government warrant requesting all information about every person who has visited the website www.disruptj20.org. Such information could include all subpages of disruptj20 that you surfed, how often you did so and the complete text of anything you might […]

May 2017

Take Yourselves Seriously: Document Retention and Destruction Policies

By |2017-08-30T16:09:52-07:00May 26th, 2017|Categories: Organizing Resources|Tags: , , , , , |

In light of the CLDC’s desire to educate activists and organizations regarding law-related topics, we will be presenting a series of informational primers that are particularly important in times of government repression and corporate attacks on dissent.  This series, “Take Yourself Seriously” will provide best practices for nonprofits, activist […]

Title

Go to Top