Common Sense Security Tips

Common Sense Security Tips
Photo by Matthew Henry / Unsplash

Use End to End Encryption

Two decades ago, I was working at Cisco when they added Lawful Intercept to Core Internet routers. Major U.S. Telecom's were hacked in 2024. So the threat of interception of your text messages is real. Other protocols such a iMessage and WhatsApp have varying degrees of E2E encryption as well, but Signal is considered the best choice.

How to Use Signal Encrypted Messaging
The best end-to-end encrypted messaging app has a host of security features. Here are the ones you should care about.

Secure your online World

Under Jen Easterly (the former CISA Director, a West Point graduate, and fromer-Military Intelligence officer) CISA made progress on promoting guidance for consumers. There are common sense steps from patching to multi-factor authentication (preferably Authenticator Apps or hardware keys, not Email or SMS) that everyone should be doing to stay safe online.

Secure Our World | CISA

Keep Privacy in Mind

In the era of surveillance capitalism, personal privacy is a never ending battle, but the EFF has been at the forefront of this issue for decades and has provided guidance for securing mobile devices when attending protests.

Privacy
New technologies are radically advancing our freedoms, but they are also enabling unparalleled invasions of privacy. National and international laws have yet to catch up with the evolving need for privacy that comes with new digital technologies. Respect for individuals’ autonomy, anonymous speech, and the right to free association must be balanced against legitimate concerns like law enforcement. EFF fights in the courts and Congress to maintain your privacy rights in the digital world, and works with partners around the globe to support the development of privacy-protecting technologies. Your cell phone helps you keep in touch with friends and family, but it also makes it easier for the government to track your location. Your Web searches about sensitive medical information might seem a secret between you and your search engine, but companies like Google are creating a treasure trove of personal information by logging your online activities, and making it potentially available to any party wielding enough cash or a subpoena. And the next time you try to board a plane, watch out—you might be turned away after being mistakenly placed on a government watch list, or be forced to open your email in the security line. Several governments have also chosen to use malware to engage in extra-legal spying or system sabotage for dissidents or non-citizens, all in the name of “national security.” As privacy needs evolve, so too should our regulatory regimes. National governments must put legal checks in place to prevent abuse of state powers, and international bodies need to consider how a changing technological environment shapes security agencies’ best practices. Above all, we need to respect the rights of autonomy, anonymity, association, and expression that privacy makes possible, while also taking into account legitimate law enforcement concerns. Read our work on privacy issues below, and join EFF to help support our efforts. For information about the law and technology of government surveillance in the United States check out EFF’s Surveillance Self-Defense project.
Infosec 101 for Activists
Website: https://infosecforactivists.org/ Introduction America has a strong tradition of activism, dating back to slave revolts and indigenous uprisings even before the founding of the United States. Today, activism in the US remains critical. Street protests are an essential tool that activists use to raise awareness and push for institutional change. That being said, challenging existing power structures carries an element of risk - exposure can lead to harassment, arrest, or doxxing.