Changes between Version 25 and Version 26 of security
- Timestamp:
- Aug 17, 2017, 3:46:39 PM (4 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
security
v25 v26 22 22 You may also be interested in [https://riseup.net/en/security Riseup's security tutorial]. 23 23 24 == Resources == 25 26 === Sending messages === 24 == Sending messages == 27 25 28 26 One activity we engage in every single day is sending each other messages. Sending messages crosses all four themes, so picking the right method will depend on, for example, how you compare your need for privacy with your need for reliability. 29 27 30 === = Email ====28 === Email === 31 29 32 30 Email is the oldest and most universal form of exchanging messages. … … 40 38 * How do you get your email? Webmail means going to a web site and entering your username and password to access your email. It is very convenient, you can access your email anywhere even if you don't have your phone or computer. However, it also means that all of your email is saved on the server, which could be subpoenaed. Alternatively, you can use a desktop or mobile client that downloads your email, removing it from the server. However, your phone or computer can be lost or subpoenaed. There is no right answer! But at MF/PL you can [wiki:/faq/email/configure-email choose between webmail or a client] based on your needs. 41 39 42 === = Other forms of instant messaging ====40 === Other forms of instant messaging === 43 41 44 42 * All May First/People Link members can use [wiki:/how-to/jabber jabber] - which works on your computer and on your phone and supports end-to-end encryption. … … 50 48 * Another popular, free and secure messaging applications is called [https://whispersystems.org/ Signal by Whisper Systems]. 51 49 52 == = Web sites ===50 == Web sites == 53 51 54 52 Web sites also cross many different security themes. Your web site may contain sensitive data that should only be scene by people with the right access. Also, your web site may track visitors, which could be used in a lawsuit to against your allies. And lastly, web sites are the most popular target of denial of service campaigns - when your political opponents try to shutdown your web site using legal or technical measures. … … 60 58 * Other campaigns are shutdown due to a technical denial of service attack - when anonymous attackers flood your web site with so much data that it stops working properly. We work closely with [https://deflect.ca/ Deflect] - a DDOS protection service and have [https://mayfirst.org/en/2015/were-back-improved-and-ready-thanks-you/ extensive experience] fending off these attacks. 61 59 62 == = Databases ===60 == Databases == 63 61 64 62 The movement is increasingly depending on databases specicially designed to help us organize. A database can help us track donors, send email communications, register people for events, generate phone lists and walk lists and more. … … 74 72 When hosting your database with a corporate provider, like Nation Builder or Saleforce, you run the risk of having your data subpoenaed without your knowledge. 75 73 76 == = Sharing Files ===74 == Sharing Files == 77 75 78 76 Sharing files is critical to movement building - whether it is allowing others to download statements or images, to providing a space for collaborative editing.