ruckus_inside_details_19
Get Updates






Home   »  Tools & Resources  »  Other Resources



Security Tips & Resources

Here are a few tips & resources we've compiled that can help folks communicate and operate in a more secure manner.

This is not an exhaustive list!

Please note that while total security isn't really possible, it is possible to conduct activities in a more secure manner. Taking precautions such as the following will help you assert your expectation of privacy.

1. First, here's a good intro article we wrote about why security is important and how it is an issue of solidarity for our movement building.

2. For secure(r) communications, we recommend:

-Keep anything sensitive - and anything about plans - off email. In general, use good non-attachment philosophy and delete, delete, delete as a general practice! (ie Regularly purge email, texts, everything. Doing this as a regular practice will make it so there's nothing left to turn over to a court if it gets subpoenaed - remember to purge sent messages too!)

-Use Email Clients: Using an opensource email client such as Thunderbird to download your email is better than keeping all your email online such as on gmail or yahoo (not to mention they are both notorious for scanning and basically owning all your data). You should enable SSL or TSL security authentication.

-Hushmail is generally considered a fairly good secure email option: anyone can set up a free hushmail.com account. You have to log in at least once every 3 weeks in order to keep it active.  While this is better than regular unencrypted email, you should still practice good purging habits and always consider that nothing you send through here is ever totally secure; it's just better.  It is still hosted by a third party that you do not know.

-Instead of email, use IM (instant messaging) as much as possible, through Pidgin with the "Off The Record" plugin. Make sure to enable the functions that do not save archived conversations. OTR allows you to authenticate who you're chatting with in a few different ways, and then encrypts the messages that you send live.

-A helpful work-planning and info-sharing tool is Basecamp.
In very small print below the big boxes you'll see that they actually offer a free plan, which can hold one 'project'.  This is a great space for people to manage tasks, etc. and use writeboards (like wikis) to keep track of plans, notes, etc. rather than emailing them back and forth.  Make sure to enable the SSL-Security function in the account settings!

-In the security hierarchy scheme of things, landlines are generally considered 'better' than cellphones.

-Use opensource software such as Openoffice.org for documents, spreadsheets, etc. rather than Microsoft Word.

3. For slightly more advanced/intensive security precautions, you may want to look into:

-Computer Operating Systems:
Macs are generally considered more secure than Windows (windows are easier to hack), but both are corporate and log your data. Lynux-based operating systems such as Ubuntu are better (note: this is easier to run on a PC than on a mac).

-TOR is a tool that protects anonymity and privacy in all online activities.

-Email Encryption: you can encrypt your email through PGP or PHP or GPG which uses private shared key-rings to authenticate who is receiving your messages, and your message then travels to the recipient in an encrypted (or 'scrambled') way, so that no one else can see it (unencrypted email basically travels like a postcard and many people along the way see it).  A good encryption resource to start is Enigmail.

4. Know Your Rights
Midnight Special Law Collective runs great trainings on security and know your rights legal issues.  Here are some great resources from them on their website.