Daniel V. Daniel V.

Avoiding doxxing / dealing with online harassment

  • Unfortunately, in some lines of activism (particularly pro-Palestine protest), doxxing can be a risk. This series of anti-doxxing guides was created with journalists in mind, but is useful to anyone wanting to opt out of data broker websites, harden your digital presence against online harassment, and assess which information is already out there.  

Read More
Daniel V. Daniel V.

Keeping profiles separate on the internet

  • You might have good reason to lighten your footprint on the social internet or make it harder to link work or personal to activist accounts. EFF has a guide to privacy considerations on social media.

  • Want to double check if there’s bleed between personas? You can use this reverse image search tool to make sure you haven’t cross posted photos that could be used to link accounts. 

Read More
Daniel V. Daniel V.

If your devices are confiscated

Surveillance self-defense protects your data from being intercepted by cops, devoured by your telecommunications providers, and sold to compile dossiers about you. But if the cops have your device and have a warrant, that’s a whole other story. This resource has examples of what cops were able to extract from a J20 defendant’s phone, which included information about contacts and Signal messages. The good news is that there are steps you can take to limit what cell phone extraction devices are able to pry out. Here’s a document about police hacking capabilities and why it’s important to encrypt your devices and set strong passwords. 

Read More
Daniel V. Daniel V.

Self-defense: encrypting your devices

Encrypting your computer 

Encrypting your phone 

Read More
Daniel V. Daniel V.

Threat modeling

  • Every protective step is a tradeoff: you could lock down your security by going off the grid, ceasing to talk to anyone, and throwing your phone in the ocean. But the reality is that collaboration is necessary for organizing, and you need usability in addition to security. Finding that balance - and figuring out what you want to protect and from whom - is called threat modeling. Here’s a guide to assessing your risks. 

Read More
Daniel V. Daniel V.

Have 5 minutes?

Here’s a tech postcard with your options for security, communication, and collaboration. Quick reference on trusted and untrusted platforms.

It’s a basic step, but setting strong passwords are one of the top things you can do to boost your digital security. Here are two zines on setting strong passwords. Print them to hand out at events! 

Read More
Daniel V. Daniel V.

Why do I need digital security?

Movements for change are often surveilled. Good digital security practices protect you, defend your comrades, and keep the cops out of action planning. You might think you have nothing to hide, but remember that your more vulnerable comrade might. A community is only as secure as its weakest link!

Read More