Here's what we look for in trustworthy technology: end-to-end encryption, open source code, and cross-platform support.
We dislike G**gle and F*c*book. Here is one reason.
Every year, Google and Facebook hand over data from roughly one hundred thousand user accounts to law enforcement and other requesters. Many of these requests come in the form of subpoenas, which do not require probable cause, can originate out of criminal […]
Security update (06/14/2018) — PGP/GPG email encryption security issues have now been fixed — please update to Thunderbird 52.8.0+ and Enigmail 2.0.7+ (for those using Apple Mail, please update to GPGTools 2018.3)
Because the confidentiality of your encrypted email relies also on others’ settings, for maximum safety until this flaw […]
Short of meeting face-to-face with a person you really know, it is sometimes impossible to know if the person you are communicating with is who you think it is.
Signal isn’t perfect and we’re not certain it’s designed with activists in mind–for instance, you and your friends can’t use it without all using real phone numbers. But still, Signal takes almost zero time or training and equips activists with 5-star end-to-end text, voice and video encryption with an […]
DreamHost, a web-host, has revealed that they are fighting the US government warrant requesting all information about every person who has visited the website www.disruptj20.org. Such information could include all subpages of disruptj20 that you surfed, how often you did so and the complete text of anything you might […]