September 2021

ProtonMail Developments: ProtonMail provides strong message privacy, but activists need to take extra steps to ensure anonymity

By |2021-09-21T10:04:40-07:00September 20th, 2021|Categories: Articles, Featured, Info, News, Resources, Security|Tags: , , , , , |

Ever since the broadly-trusted, Switzerland-based encrypted email service ProtonMail acknowledged that it helped identify a young French climate activist, organizers have been pondering whether they should continue using ProtonMail accounts.

For the sake of solidarity, the strength of our movements, and the safety of our people, activists must never cooperate […]

January 2021

Digital Security Recommendations for 2021

By |2021-01-14T14:16:54-08:00January 14th, 2021|Categories: Articles, Info, News, Organizing Resources, Security|Tags: , , , |

TLDR: Just look for the –> arrows and do some of these things. If you only have capacity to do a few things, do one from each category, starting from the top.

Why are you making me read this?

As a movement, we’ve all been working hard together to adopt strong encryption […]

July 2019

Does ProtonMail Snitch?

By |2019-07-02T16:08:36-07:00July 2nd, 2019|Categories: News, Organizing Resources, Resources, Security|Tags: , , , , , |

Since this Register article was recently published, some activists are concerned about whether or not ProtonMail can be trusted.

The CLDC has expressed reservations that ProtonMail may not be the best choice for activists. Despite the worrisome recent news, ProtonMail is nevertheless a reasonable choice for encrypted email. As […]

December 2017

Google and Facebook give your data to cops

By |2019-05-16T18:18:59-07:00December 7th, 2017|Categories: Articles, Resources, Security|Tags: , , , |

We dislike G**gle and F*c*book.  Here is one reason.

Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters.  Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]

October 2017

Advanced GPG Email Encryption: Self-Study Guide

By |2017-10-31T12:35:30-07:00October 31st, 2017|Categories: Security|Tags: , , , |

So, you’re set up to use GPG email encryption using Thunderbird+Enigmail in one of our trainings or using our online guide.  The following exercises will help reinforce key concepts and teach you some advanced tricks.

Importing (and fingerprinting) public keys

Now that you are using GPG email encryption, you will need […]

GPG email encryption guides

By |2021-10-12T12:40:37-07:00October 29th, 2017|Categories: Resources, Security|Tags: , , , , , , , |

Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw is patched, please use encrypted instant messengers like, Keybase, Wire or Signal for the most sensitive communications.

We recommend people use End-to-End Encrypted communications whenever possible […]

September 2017

August 2017

What happens to deleted emails?

By |2017-08-07T17:32:54-07:00August 7th, 2017|Categories: Security|Tags: |

In response to a question to the Digital Security for Activists program:

How secure is it to delete email and other internet documents? Who owns the deletions– the email provider, the ISP, the owner of the server/hardware? The person/entity who wrote it? The person/entity who received it?

After deleting an email, you […]

Title

Go to Top