Toolkits

Table of Contents

We’ve centralized a selection of curated digital tools to empower robust communication, organization, and sovereignty.

Community Organization

Care about an issue? Here’s how to bring visibility and traction to your vision.

Digital Security

Generally speaking, the most important things to remember are:

– don’t do anything too stupid on your devices. There is no such thing as a mainstream device with actual, true privacy. Every keystroke is able to be logged at the keyboard (physical or on-screen.)

– never put anything in or on, say anything within earshot of, or take your device to a location if you’re not comfortable with at least one other person knowing what or where it was.

Beyond that:

– make sure you opt-out of targeted advertising, information sharing, “product improvement” and elect any other options to restrict sharing or using your data.

– choose to share your data only with companies you deem politically or socially acceptable.

– if you can afford it, pay for your data services. When you’re the customer, you have stronger rights. When the service is free, you (your data) are the product.

– your data leaks every time you go online. In the case of always-on devices, your data is always leaking. The idea is to tighten the leaky spigot as much as you can tolerate. But – a tight faucet can be less convenient, so you’ll have to decide how much leaking you’re ok with.

I’m especially concerned about:

My information being analyzed and monetized (Corporate Surveillance)
Law Enforcement Encounters (Subpoena Protection)
Someone gaining (or having) access to my device (Physical Device Access)
Being hacked (Virtual Device Access)
Using public wifi (Secure Browsing)
Attending public gatherings or other Constitutionally protected assemblies (Location Privacy)
Corporate Surveillance

a) Choose better. If you know a given company is notorious for invading your digital domain – like Meta or Google – find better options. There are good alternatives available. Ask your family, friends, and organizations you work with to switch alongside you. You’ll gain more privacy, and you’re also signaling to the marketplace that invasive data-mining practices are not ok. This will eventually force companies to adapt or lose more and more market share.

Subpoena Protection

a) Use secure/encrypted platforms for email and text.

b) Choose data-secure companies and host-countries for your services and data storage. A US-based legal order for your data to a US company like Apple or Google is going to result in your data being made available. In the same scenario, if your data is held in a country with strong data protection rights and no agreements with the US to honor overseas legal orders, you’re much more likely to be protected in the way you would prefer.

Physical Device Access

a) Border Crossing

– Mail your device ahead

– Burner/dumb/secondary phone in transit

b) Arrest

– No biometric logins

Being Hacked

a) Phishing scams

b) Software updates

c) Verified apps

d) Password Hygiene and Managers

Secure Browsing

a) VPN

Location Privacy

a) Faraday bag

b) Leave it