(Rebooting this chain from last month - with updates.)
Recommendation #1: This is a priority: Practice security culture.
The Electronic Frontier Foundation has a fabulous on-line guide to Surveillance Self-Defense. (1/x)
[#]Resistance #Infosec
ssd.eff.org
=> More informations about this toot | More toots from MNSpy@mastodon.online
Download this pdf now before it is taken down by Trump/Musk:
Mobile communications best practices guide from the Federal Cybersecurity and Infrastructure Security Agency. (2/x)
[#]Resistance #Infosec
https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf
=> More informations about this toot | More toots from MNSpy@mastodon.online
Switch your text communications to an end-to-end encrypted messaging app (such as Signal) ensuring protection of your messages. Do it now. (3/x)
https://signal.org/
[#]Resistance #Infosec
=> More informations about this toot | More toots from MNSpy@mastodon.online
Even with end-to-end encryption, maintain information security. Zero day vulnerabilities may still allow back-door access to communication. Do not write anything in email or text msgs that would be incriminating. (4/x)
[#]infosec #OperationRubicon
https://www.pcmag.com/how-to/what-are-zero-day-exploits-and-attacks
=> More informations about this toot | More toots from MNSpy@mastodon.online
Use a VPN when working on-line (on your desktop, laptop, & smart phone). A VPN both protects your identity by blocking others from knowing your IP address (& location) and allows you to circumvent internet censorship. If you can, pay for a VPN rather than just use a free version. (5/x)
[#]Resistance #Infosec
https://www.pcmag.com/picks/the-best-free-vpns
=> More informations about this toot | More toots from MNSpy@mastodon.online
Surveillance occurs in multiple ways. Beware of computer technologies all around us. Place your smart phone in a Faraday cage to keep Siri from listening to your sensitive conversations.
Note that these can be homemade (Google it).
Test your Faraday cage before assuming it works. (We discovered we needed to double bag our phones.)
(6/x)
[#]Resistance #Infosec #Luigi
https://nerdtechy.com/best-faraday-bag
=> More informations about this toot | More toots from MNSpy@mastodon.online
Surveillance occurs in multiple ways. We do not use Alexa or similar “internet of things’ devices. Avoid signing up for home surveillance or consider removing these technologies from your home. (7/x)
[#]Resistance #Infosec
=> More informations about this toot | More toots from MNSpy@mastodon.online
Surveillance occurs in multiple ways. Beware of ‘hidden’ surveillance devices, such as smart cars. (8/x)
[#]Resistance #Infosec
https://apnews.com/article/tesla-las-vegas-explosion-cybertruck-elon-musk-789dc864a0c138fd7c36ca8c94b0fbfd
=> More informations about this toot | More toots from MNSpy@mastodon.online
Surveillance occurs in multiple ways. Beware of home surveillance security systems (such as the Ring camera). And beware that your neighbors are likely using such devices. (9/x)
[#]Resistance #Infosec
https://www.yahoo.com/news/know-rights-3-rules-police-163003708.html
=> More informations about this toot | More toots from MNSpy@mastodon.online
Aside from electronic security, understand your rights if and when confronted by the police. This manual was written in 2001 for Canadian activists. Does anyone know of a more recent (& US focused) on-line resource? (10/x)
[#]Resistance
https://mutualaiddisasterrelief.org/wp-content/uploads/2017/05/security-culture-a-handbook-for-activists.pdf
=> More informations about this toot | More toots from MNSpy@mastodon.online
Recommendation #2: Build your network of resistance and support. Focus on those who you have known the longest who share your values. Discuss resistance strategies, red lines, communication, and communication back-ups. Do it now. (11/x)
[#]Resistance #networking
=> More informations about this toot | More toots from MNSpy@mastodon.online This content has been proxied by September (3851b).Proxy Information
text/gemini