Intro to Digital Security

Where do you start?

Much more to come.

0. Study up on Security Culture & make sure you have tech-savvy people that can help your community to implement safer digital practices.

Stay updated & informed. Any resources we consider to be reliable today can be compromised tomorrow. Plan Accordingly.

If you feel that you and the people in your community might be at risk targeted by extremist groups, local or federal governments, corporations owned & operated by power mad CEOs you’re probably thinking it’s time to learn how to be safe about your online presence, phones, computers, smart TVs, & home security systems.

It can be really difficult to know where to start. Because of this we’ll be producing a series of detailed how-to videos, providing a ton of resources, starting from a foundation of Security Culture, helping you to understand the changes you & your community can make to limit certain risks.

What is Security Culture? We will cover this in-depth in interviews and informational videos, but Security Culture is a set of customs shared by at-risk communities, designed to minimize risk.

Journalists, Educators, Healthcare Workers, Members of Labor Unions, Ethnic Minorities, Queer/Trans/Non-Binary people, and Activists are all at risk of increased surveillance and targeting by fascist organizations.

If you are tech-savvy, people are going to need your help with these things. Be patient.

Of course, Hard Left News and this channel are community supported. If these resources are important to you, please subscribe, share, and consider donating.

What is Security Culture? A Guide to Staying Safe – Sprout Distro Zines

https://www.sproutdistro.com/catalog/zines/security/what-is-security-culture-a-guide-to-staying-safe

Towards a Collective Security Culture – CrimethInc. https://crimethinc.com/2009/06/25/towards-a-collective-security-culture

Threat Modelinghttps://www.privacyguides.org/en/basics/threat-modeling/

Comprehensive Privacy Tool Recommendations – Privacy Guide – https://www.privacyguides.org/en/tools/

Your online presence & device usage pose certain security risks. What can you do about it?

First, Determine Your Risk Profile, or Threat Model. Identify what you need to protect, take inventory of behaviors & threats, create a Security/Safety Plan and stick to it. Understanding that you can’t protect against all risks, that things change without notice, your day to day behaviors online and in person should reflect that.

1. Research & Understand who & what puts you & your community at risk. Who do you communicate with? How & when do you communicate?

2. List your Devices, Tools, & Activities. Take a look at the programs & apps you use. What purpose it serves? What information does it gather? Does that pose a privacy/security risk?

3. Safety Plan. What changes you & your community need to make. What work or communication needs to be performed using phones & computers? What Programs & Apps do you really need?

4. Stay Disciplined. You and your community are making these changes for a reason.

What changes you need to make depends on how at-risk you are and when.

What are the most important changes to make first?

– Devices Secure Access & Use

– Platforms Open Source Entertainment & Productivity Options

– Software > Apps/Operating Systems > Who is in Control?

1. Stay Updated. Keep all of your operating systems & apps updated. We also mean that you & your community need to stay updated & informed. Any reliable, vetted resources can be compromised tomorrow. For instance, for ages Mozilla had been a trusted browser and Proton was trusted for email & VPN. Now we’re not so sure, so we avoid products made by these companies. Stay informed.

2. Phone Carriers. Understand that for well over a decade cell phone carriers have had a bad habit of handing over access to your calls, texts, and location data, even without a warrant. If you think that is a real concern, leave your phone at home.

3. Texting & Voice Calls. Always use Signal for end to end encrypted texting, voice and video calls. They even have a desktop App that can be setup on nearly any system.

4. Passwords & Logins. Use KeePass as a Password Manager. Stop using FaceBook or Google to login to other websites. Change that to password access. Any passwords saved in corporate browsers need to be changed. Change your passwords at least every couple months.

5. Email. We recommend people to switch to Mailfence, Tuta, Disroot, or RiseUp. We encourage folks to learn how and when email is encrypted, so they can understand that for more sensitive communications using Signal might be a better choice.

6. VPNs. Use a reliable VPN whose company isn’t based in the US. We recommend Mullvad, Wireguard, or IVPN.

7. Browsers. We recommend Vivaldi or Tor Browser. Stay away from Chrome, Safari, Edge, & Firefox.

8. Search Engines. We recommend using Startpage or DuckDuckGo as your default search engine.

9. Navigation. OpenStreetMap and apps that utilize that system.

10. Social Media. The social media platforms we do recommend are Mastodon, Pixelfed, PeerTube, Diaspora*, and at least for now,Bluesky. We encourage people to try to leave the primary social media platforms such as FaceBook, Instagram, Twitter, TikTok, LinkedIn, etc. If you aren’t able to whether that’s because of work or community, we do encourage people to delete the social media apps on their phones and try to exclusively access these platforms using a safe browser.

11. Cloud Storage. Understand that Cloud storage means your files, your private information, is being stored on someone else’s computer. Whether it’s iCloud, Dropbox, Google Drive, or the numerous other options, should be treated as security risks. We recommend setting up a private encrypted server using Wireguard.

12. Productivity. From shared documents to calendars, notes, and photos: There are several open source, community developed productivity-based software options with great security that we will link to in the description and on our website.

13. AI & Tech Monopolies. The bigger names in Tech, as well as the small companies and governments that work with them, have become serious risks to the safety of most private citizens. And that’s regardless of political leanings, nationality, ethnicity, gender, or orientation. Any software owned and operated by Apple, Google, Amazon, Meta, Twitter, Microsoft, OpenAI, are considered very high risk. All of these companies have been cooperating with law enforcement, providing surveillance support for the United States, it’s allies & adversaries, for ages. In recent years they have shown they are committed to a surveillance state, for a multitude of bizarre and fascistic reasons. We urge everyone to avoid using products made by companies with any serious emphasis on Generative AI.

Curtis Yarvin

The Reactionary Prophet of Silicon Valley

https://www.thenation.com/article/politics/curtis-yarvin

Roundup: Who helped Elon Musk buy Twitter?

https://www.disconnect.blog/p/roundup-who-helped-elon-musk-buy-twitter

Peter Thiel

Peter Thiel Embodies Silicon Valley’s Conservative Past and Dystopian Future

https://jacobin.com/2021/10/peter-thiel-silicon-valley-tech-right-wing-libertarian-military

Trump Ally Peter Thiel’s Op-Ed Turns Heads for Being ‘Beyond Nuts’

https://www.thedailybeast.com/trump-ally-peter-thiels-op-ed-turns-heads-for-being-beyond-nuts

Marc Andreesen

Marc Andreessen Manifesto Says AI Regulation “Is a Form of Murder”

https://www.404media.co/marc-andreesen-manifesto-says-ai-regulation-is-a-form-of-murder

The Forgotten Story of How Conservatives Shaped the Internet

https://techwontsave.us/episode/251_the_forgotten_story_of_how_conservatives_shaped_the_internet_w_becca_lewis

Sam Altman

OpenAI Announces Sam Altman Is Returning as CEO With a ‘New Board’

https://www.404media.co/openai-announces-sam-altman-is-coming-back-and-theres-a-new-board

Sam Altman doesn’t care about you

https://www.disconnect.blog/p/sam-altman-doesnt-care-about-you

How Does OpenAI Survive?

https://www.wheresyoured.at/to-serve-altman

AI, Eugenics, & Fascism

The TESCREAL bundle: Eugenics and the promise of utopia through artificial general intelligence

https://firstmonday.org/ojs/index.php/fm/article/view/13636

14. Operating Systems. Windows, Apple, and Android Operating Systems pose significant serious security risks, especially with AI integration. Consider installing Linux Mint or Debian on your computers. * If your community is at high-risk for targeting, we recommend using a LIVE, secure OS like Tails. 

  • For Android Phones there are non-Google OS options such as Graphene, PostMarket, Lineage, Calyx, /e/OS, and Tizen. There are no safe open source Operating Systems for iPhones yet. 

15. LinuxOS. We’ll link to a resources that allow you to test drive a variety of Linux Operating Systems on you computer before you install them. By setting your system up to dual boot you can keep Windows or macOS on your computer if you need access to certain software. 

  • Running a Linux distribution on your computer or phone means you aren’t using a corporate operating system with built-in surveillance vulnerabilities. If your community is at high-risk for targeting, we recommend using a LIVE, secure OS like Tails. 

16. Smart TVs double as surveillance devices. For those Smart TVs that don’t have open source options available, disconnect them from the internet, connect them to your computer and use them as a monitor for a more secured device.

17. Home Security Systems are meant to be surveillance devices. A lot of the more common systems, can be reprogrammed with open source software, taken off corporate networks, so they can be controlled by you and your household.

If we haven’t produced our own resources on something we mention here, we will link to any instructional videos, PDFs, news articles, and other information to help you stay informed. Coming soon will be a series on Security Culture, Digital Security, How to install new operating systems on your computers, smart devices, home security systems, a Private Server running Wireguard, a Peertube server, and more.

Hard Left News and this channel are community supported. If these resources are important to you, please subscribe, share, and consider donating.

We’ve all taken for granted the convenience of a lot of this technology. In doing so, we have became the products for these companies. This has put us all at great risk.

Build Community. Stay informed. Stay Safe.

Recommended Tools & Apps

Messaging – Calls & Texts

Signal https://signal.org

Password Manager

KeePass https://keepass.info

Email

Mailfence https://mailfence.com

Tuta https://tuta.com

DisRoot Email & Productivity Tools https://disroot.org/en/about

RiseUp Email & Productivity Tools https://riseup.net

VPN s

Mullvad VPN & Browser – https://mullvad.net/en

WireGuard VPN & Server Configuration https://www.wireguard.com

IVPN https://www.ivpn.net/en/

Browsers

Vivaldi https://vivaldi.com

Tor Browser https://www.torproject.org

Search Engines

Startpage https://www.startpage.com/

DuckDuckGo https://duckduckgo.com

Navigation

Open Street Map https://www.openstreetmap.org/

Navigation Apps https://osmand.net

Networking/Cloud Options

WireGuard https://taggart-tech.com/wireguard/

Tails https://www.privacyguides.org/articles/2025/01/29/installing-and-using-tails/

Wire Video Conferencing & Productivity https://wire.com/en/

LinuxOS

DistroSea Test Drive Linux Distributions on your computer https://distrosea.com

Linux Mint https://linuxmint.com

Debian https://www.debian.org

Tails Live OS https://tails.net

OpenSource OS options for Android Phones

GrapheneOS https://grapheneos.org

PostMarketOS Phones & Computers: https://wiki.postmarketos.org/wiki/Devices

LineageOS Phones, Tablets & Smart Devices: https://wiki.lineageos.org/devices/

CalyxOS https://calyxos.org

/e/OS https://doc.e.foundation/easy-installer

TizenOS Phones, Netbooks, Tablets, Wearables, Smart TVs: https://developer.tizen.org

iPhone OS Resources

Project Sandcastle for iPhone https://projectsandcastle.org

OpenSource Home Security Firmware

Thingino – https://thingino.com

OpenSource Router Firmware

OPNsense https://opnsense.org

OpenWrt https://openwrt.org

______________________________

Additional Comprehensive Security Culture Resources

Surveillance Self-Defense https://ssd.eff.org/

Avoid the Hack – https://avoidthehack.com

Privacy Guides – https://www.privacyguides.org/en/

Civil Liberties Defense Center – Digital Security (DS) Program https://cldc.org/security/

Security-in-a-Box is a Project – https://securityinabox.org/en/

Strengthen your digital security with Freedom of the Press Foundation https://freedom.press/digisec/

Neighborhood Anarchist Collective – Security Culture – https://neighborhoodanarchists.org/

PRISM ⚡ Break https://prism-break.org/en/

Surveillance Info

https://atlasofsurveillance.org

https://www.surveillancewatch.io

Social Media monitoring

https://theintercept.com/2025/02/11/ice-immigration-social-media-surveillance/

https://www.theverge.com/news/610951/federal-workers-privacy-surveillance-signal-facebook-messenger

MS Dynamics 365

https://www.404media.co/how-a-microsoft-app-is-powering-employee-surveillance

Google Gemini

https://gizmodo.com/usaid-workers-reportedly-believe-they-were-recorded-by-googles-gemini-ai-2000563837

Apple Backdoor

https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life

Previously Trusted Companies

Mozilla/Firefox/Thunderbird

AI Integration via Roost, partnering with the likes of Microsoft https://blog.mozilla.org/en/mozilla/ai/roost-launch-ai-safety-tools-nonprofit/

https://roost.tools

Cooperating with governments to prevent use of anti-surveillance tools https://theintercept.com/2024/06/12/mozilla-firefox-russia-censorship-blocked/

Proton Mail/Wallet

Proton being called into question started with the CEO, Andy Yen, tweeting support of Trump Admin & cabinet picks. https://theintercept.com/2025/01/28/proton-mail-andy-yen-trump-republicans/

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top