Professional Documents
Culture Documents
Tech Security For Activists
Tech Security For Activists
Tech Security For Activists
Dimi(ClimateActionCamp/CJABelgium)
https://we.riseup.net/psi36
* A phone call can be authenticated if you recognise the voice of the caller. ** Phone calls can be intercepted. *** VoIP calls can be routed through secure networks
Organising Online
WayspeopleOrganiseOnline
SocialNetworkingSites InstantMessagingandTwitter EmailandEmaillists
Securetools
Crabgrass,Friendika,Diaspora IRCandIdenti.ca Activistmailinglists(weakestlink)
aktivix.org,riseup.net,psand.net
Securingyourownemail
GPGencryption
Misdirection/obscuring/steganography
Ubuntu:http://bit.ly/EncryptedPrivateDirectory http://mozaiq.org/encrypt/
Nosystemisfoolproof!
Free as in Freedom
Ubuntu:livecdorusb:http://www.ubuntu.com/ Browser:http://www.mozillaeurope.org/en/firefox/ Emailclient: http://www.mozillamessaging.com/nl/thunderbird TorOnionRouter:http://www.torproject.org/ GPGencryption:http://www.gnupg.org/ Crabgrass:https://we.riseup.net/