Digital Security & Safety 101 #CFMPublicResources

Page 1


DIGITAL SECURITY

Digital Security Workshop

Feminist Security Guide + Tips

More Digital Security Resources

Access in Other Formats

Connect with CFM!

AboutThisZine:

Hello dear souls! We wanted to compile some helpful Digital Safety & Security Information and Resources from our #CFMWorkshopHighlights series, alongside some additional information from various resources around the web. We hope that this is a helpful introduction for folks who are interested in learning more about Digital Security, Safety, and/or Data Privacy.

We have included credit where and when possible Please do feel free to share any information or resources you've found helpful in the comments of our LinkedIn article! And, while we cannot promise to answer all of them, we always welcome questions, too. If you'd like to submit additional resources, please do so here.

If you cannot find specific resources, please let us know through the (above) form or by emailing creatingfreedommovements@gmail.com

DigitalSecurityBasics

First, we wanted to share some information from our 2024 Digital Security Workshop, led by JC Sanchez. JC is a proud UC Santa Cruz Alumnus, where he studied Global Information Systems & Security before working in the nonprofit sector specifically at the intersections of technology & social justice! As we hear more and more about digital surveillance, censorship, or other suppression, it is more important than ever for us to be knowledgeable about our tech, our data, and how to protect what is important to us.

JC opened our space with an important reminder:

When it comes to compromised data,

we no longer live in an “if” world, but instead, a “when.”

In Digital Security, a threat is a potential event that undermines your efforts to defend your data. The process of creating a security plan is sometimes referred to as threat modeling. Trying to protect yourself all the time, from everyone, is impractical & exhausting. However, with thoughtful planning, we can each develop a security plan that works for us. When building a security plan, start by asking yourself these questions:

Remember:

Security is a process, not a purchase. It’s not just about the tools you use or software you download. That said, there are many helpful tools and software programs out there — JC offered some additional considerations & recommendations in the workshop slides, generously made available as a CFM Public Resource — access online here.

Trying to protect yourself all the time, from everyone, is impractical & exhausting However, with thoughtful planning, we can each develop a security plan that works for us. JC also noted the importance of frequent security checks, reminding us:

What Is Secure Today, May Not Be Secure Tomorrow!

In addition to leading a phenomenal workshop, JC generously made his workshop materials available as a CFM Public Resource! You’ll find more detailed steps to Build Your Own Security Plan & some digital Security Recommendations from JC! Access PDF slides: tiny.cc/DigitalSecurityCFM

In addition to leading a phenomenal workshop, JC generously made his workshop materials available as a CFM Public Resource!

Scan for a detailed breakdown of how to build your own security plan and some digital security recommendations from JC!

Thread by

from thread

Tip 1: Encrypted Messaging — for when you want to protect your texts. This means end-to-end message encryption scrambles your message while it's being sent so no one else can read it. (eg. Signal).

Tip 2: Anonymous Browser — for when you want to surf the web anonymous. Tor helps you avoid surveillance.

Tip 3: Secure Your Internet Connection — for when you want to surf the web anonymously. It works by hiding your online activity.

Tip 4: Protect Your Location Data — for when you're headed to a sensitive location. You can turn off location permissions on your phone.

Take Action against Big Tech Censorship:

Share @LiberalJane's Post: (IG & Twitter) & Follow @Safe2Choose and @htuabortionpill to stay up to date!

Tag Big Tech: Instagram, Meta, TikTok, Youtube, Google & X (aka Twitter)!

Report an incident: Have you had content removed? Report it to @ReproUncensored!

A note from CFM:

If this content was interesting and useful to you, you may want to check out Digital Defense Fund and their resources for Digital Security & Safety as it pertains to the Abortion Access & Reproductive Justice Movements. More info available in the Digital Security section of CFM's Abortion & RJ Resources Guide!

And, in the months since, we have learned more about Digital Security and wanted to share some resources & information with all of you! Keep reading for 101 Level Resources for folks who want to learn more about Digital Safety, Cybersecurity, and/or Data Privacy.

DigitalSecurity &Safety101

Collected Resources from the CFM Core Team

AvailableOnline:

ReadtheZine:

Available on Issuu.

Access the full list, with clickable links, as a readable zine! Check out other Zines from CFM start reading over on Issuu!

SharetheArticle:

Available on LinkedIn.

Open-Access Article, available on LinkedIn. You do not need an account to read, though you would need an account to comment or share on the article, directly.

DownloadthePDF:

Available on Google Docs.

This is the most up-to-date version of the collected resources, as shared on Google Docs and available to download as a PDF.

A comrade of one of our Core Team members shared these resources when discussing Digital Security in a larger thread. We have pulled several links and still (always!) do encourage folks to connect with the original resources:

Surveillance Self-Defense Guide:

Explaining The Basics of Digital Security

If you’ve ever worried about protecting the privacy of your digital data or your conversations with others, we’re here to help. Surveillance Self-Defense is a digital security guide that teaches you how to assess your personal risk from online spying. It can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states. Surveillance Self-Defense offers guides to the best privacy-enhancing tools and explain how to incorporate protecting yourself against surveillance into your daily routine.

If you’re ready to take the first steps, their series of basic guides will help you to understand what digital surveillance is and how you can fight it.

free guides:

Your Security Plan Guide

Creating Strong Passwords

Keeping Your Data Safe

What Should I Know About

Communicating With Others

Choosing Your Tools

Seven Steps To Digital Security

Why Communication Metadata Matters

Animated Overviews

How Strong Encryption Can Help Avoid Online

Surveillance: With the majority of traffic on the Internet viewable to anyone that has access to the computers that your message passes through— from the computer in your home, to your local ISP, to the final destination of your message and all points in between — how is anyone able to mitigate online surveillance and keep their communications private? The answer is by using strong encryption.

Using Password Managers to Stay Safe Online:

You get a lot done on the Internet, and that means you probably have a lot of accounts on many different websites. But did you know that if you use the same password on every website or almost use the same password and change it a little bit for each site you’re more vulnerable to a cyber attack? Break-ins happen more than you think and often without the hacked website even knowing. This video shares more about 2 tried & through methods for password protection to help you stay safe online.

Animated Overviews

Protecting Your Device From Hackers:

Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself.

How to Make a Super-Secure Password Using Dice:

Computer passwords have the power to unlock vast troves of information, but some passwords are so simple that it’s easy for thieves to guess them. Attackers these days use computer programs to guess passwords—and those programs can guess millions of passwords every second. One method of inventing a truly random & long password you can actually remember is Arnold G. Reinhold’s Diceware technique: creating a secure password by using dice & a list of Diceware words.

The New Oil: A Beginner’s Guide to Data

Privacy &

Cybersecurity

Whether you’re looking to keep yourself safe from identity theft and common hacks, whether you simply object to mass surveillance, or anything in between, this site will help you learn the basics about protecting your identity, your safety, and your data in a way that’s accessible and achievable. Welcome to privacy made easy. There are a few sub-sections for ease:

Getting Started: New here? Not sure why privacy matters, how to build a threat model, or the difference between security & privacy? Start here!

Most Important: Are you ready to patch up the most important holes in your security? Looking for the easiest steps to take with the maximum impact? Read this section!

Moderately Important: Already got the basics covered but ready to take your privacy and security to the next step? Read this section!

Less Important: Ready for more advanced topics? Ready to start working on those last few tiny leaks you have left in your digital life? This one’s for you!

Quick-start guides

Identity Theft: These pages will teach you how to protect against the most common techniques used to impersonate you and steal your identity.

Mobile Devices: Got a new phone and looking to get as much privacy and security out of it as possible? Start here.

Desktop & Laptop Computers: Want to protect your Mac or PC as much as possible? This guide is for you!

Home Network (Wifi): If you just got a new router, are thinking about getting a new router, or simply want to know the best way to protect your home network from threats, this guide is a must-read starting point.

Content Creators: If you want to be an influencer, streamer, or other type of content creator, this guide will help protect you from doxxers, stalkers, and data leaks.

Access All Guides from The New Oil.

Privacy Guides: Why Privacy Matters

In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. Your privacy is up for grabs, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around information. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters.

Build your Knowledge Base with these guides:

And check out other resources from Privacy Guides:

Tech Essentials

Introduction to Passwords

Multi-Factor Authentication

Choosing Your Hardware

Email Security

Virtual Private Network (VPN)

Overview

Advanced Options

DNS Overview

Tor Overview

Private Payments

Types of Communication Networks

additional notes:

The person who recommended these resources noted that this is a lot to transition, and that this can be overwhelming! They shared that they use Proton VPN so that websites can't track their IP address from various devices. For extra privacy, they use TOR browser, but mentioned typically using Firefox with uBlock Origin (extension that blocks ads + trackers) & Bitwarden (password manager).

For Androids, they mentioned removing Google & instead, installing a different, privacyfocused Operating System called CalyxOS.

They also noted trying to shift away from corporate social media as much as they can and named federated social media like Mastodon as being a positive experience so far, noting that it is “a lot smaller and has a little bit of a learning curve, [but is] pretty cozy, there's no ads, no algorithm, and a lot of built in features that increase accessibility (very effective block functions, content warnings, moderation by real humans, dark mode, etc.)”

Notes from a Comrade of one of CFM’s Core Team Members

additional resources

Awesome Privacy: a curated list of privacy & security-focused apps, software, and providers (aka Tools + resources for Digital Security)

+ Fedizine: Anarchist Guide to Federated Social Media (Zine)

We are so thankful to the comrade who shared these resources!

Deleteme

DeleteMe empowers individuals and organizations to reclaim their privacy by removing personal data from online sources, including but not limited to: Name, Age, Address, Phone, Relatives, Social media, Occupation, Marital Status, Property Value, Past Address, Photos, and Email(s). We've highlighted a few resources from their organization to help folks get started:

How DeleteMe Works: We remove your personal information that’s being sold online.

DIY Opt-Out Guides: DeleteMe is here to help you protect and regain your online privacy. We’ve compiled a list of data brokers, along with an opt-out guide for each data broker website. Doing this yourself won’t cost you anything. However, it can take hours to go through each website and remove the personal information for just one person – let alone an entire family.

Privacy Tips & News (Blog): Learn more about data privacy, data brokers, breaches, and more. Our blog (and monthly newsletter ‘Incognito’) cover best practices when it comes to keeping your information safe as well as staying informed about the latest trends when it comes to online privacy.

YK hong

YK Hong (IG: @ykreborn) regularly shares information and resources for Tech Justice and Data Privacy. Today (January 28th) is Data Privacy Day. YK wrote a piece on how, if and when we can, we should opt out of biometric theft everywhere — available for their subscribers (free tier available) on Substack!

You can learn more through YK’s 'Tech Justice' highlight on Instagram or by connecting with YK on other Social Media: Instagram, Substack, Patreon, BlueSky, & YouTube!

January was Stalking Awareness Month, something that is increasingly being done through digital means. We wanted to highlight a few tools related to stalking, specifically — primarily sourced from the Stalking Prevention, Advocacy, & Resources Center (SPARC):

Risk Assessment & Safety Planning

Identifying Stalking Behaviors

Safety Planning for Stalking Victims

The following resources are also available in Spanish learn more through SPARC en Español. And, check out SPARC’s eLearning Courses, register for one of their Upcoming Events, and more through SPARC’s website!

We know that Disabled, Queer + Trans, and/or racialized folks are often targeted in online harassment campaigns, whether or not they consent to being public figures. Some of the resources above are focused on digital security for content creators and/or other folks who may have public social media or online presence(s). We also wanted to highlight an incredibly useful FREE + Virtual RiskAssessment Tool for folks being harassed or stalked, the:

(SHARP): Stalking + Harassment

Assessment & Risk Profile

While many threat assessments focus primarily on domestic violence, SHARP is a tool designed specifically to examine and assess stalking. SHARP is a 48-item web-based assessment which provides an assessment of the “big picture” of the stalking situation. It also provides a situational risk profile that consists of 14 factors associated with a wide variety of harms including physical or sexual attack, harm to others, ongoing and escalating stalking and harassment, and life sabotage. SHARP is free to use and provides both a narrative of the stalking situation and the risk profile, as well as information about stalking risks and safety suggestions.

The SHARP narrative and risk profile report has been successfully used [globally] to support stalking victim safety and hold stalkers accountable, including: helping petitioners successfully receive civil protection orders as part of criminal case, as evidence that helped prosecution move forward, and/or helping to obtain higher bond and GPS conditions.

CFM PUBLIC RESOURCES

DISABILITYJUSTICE

REPRODUCTIVEJUSTICE& ABORTIONRESOURCES

SEXEDFORALLAGES

16DAYSOFACTIVISM AGAINSTGBV

Creating Freedom Movements

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.