End-to-End Encryption is the best security model for communications or online document storage, but the term is a bit of a mouthful that isn't always clear ("the ends are me and the server, right?" -- wrong!). So let's try using a new term -- Direct Encryption -- meaning: the only people who can decrypt and read messages are those directly involved in a private conversation or project.
For reasons, we can't say that any digital technology could ever be considered 100% trustworthy. At the same time, most people can't do all their organizing in person on backcountry camping trips, so we won't say "just don’t use phones or computers." What we will do is try to give you a way to decide how much to trust each of your devices and apps.
We dislike G**gle and F*c*book. Here is one reason.
Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters. Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]
Activists who do not encrypt their communications put themselves and others at risk of surveillance. Encryption is more important than ever, but also much easier to use than it once was. We will give an overview of state-of-the-art secure communications tools, discuss trade-offs and considerations in choosing the right tools […]
Short of meeting face-to-face with a person you really know, it is sometimes impossible to know if the person you are communicating with is who you think it is.
While there is no way to be completely immune from surveillance, following our advice below will keep you and your comrades much safer. We will be updating this page with more guidance on how to most effectively organize in an age of widespread electronic surveillance. Stay tuned!