beginner

Tails for Anarchists

Published on   | Last edited on 
39 min

Tails is an operating system that makes anonymous computer use accessible to everyone. Tails is designed to leave no trace of your activity on your computer unless you explicitly configure it to save specific data. It accomplishes this by running from a DVD or USB, independent of the operating system installed on the computer. Tails comes with several built-in applications preconfigured with security in mind, and all anarchists should know how to use it for secure communication, research, editing, and publishing sensitive content.

Read More

Tails Best Practices

Published on   | Last edited on 
42 min

All anarchists should know how to use Tails — this text describes some additional precautions you can take that are relevant to an anarchist threat model. Not all anarchist threat models are the same, and only you can decide which mitigations are worth putting into practice for your activities, but we aim to provide advice that is appropriate for high-risk activities like claiming an action. If you are new to Tails, start with Tails for Anarchists.

Read More

Remove Identifying Metadata From Files

Published on   | Last edited on 
5 min

Metadata is data about data or information about information. In the context of files, this can mean information that is automatically embedded in the file, and this information can be used to deanonymize you. For example, an image file will often have metadata about when it was taken, where it was taken, what camera it was taken with, etc. A PDF file may have information about what program created it, what computer, etc. This can be used by investigators to link a photo to the camera on which it was taken, a video to the computer on which it was edited, and so on. Before you put a sensitive file on the Internet, remove the metadata.

Read More

Make Your Electronics Tamper-Evident

Published on   | Last edited on 
18 min

If the police ever have physical access to an electronic device like a laptop, even for five minutes, they can install hardware keyloggers, create images of the storage media, or otherwise trivially compromise it at the hardware, firmware, or software level. One way to minimize this risk is to make devices tamper-evident. As the Threat Library notes, "Tamper-evident preparation is the process of taking precautionary measures to make it possible to detect when something has been physically accessed by an adversary."

Read More