=====Secure Communications===== ^ Online resource ^ Comments ^ Level of Message Security ^ See ^ | Facebook | both sides using smart phones | secret chat available | [[https://ssd.eff.org]]| | (FB) | either side using computer | no end-to-end encryption | | | Instagram | | | [[https://www.bankinfosecurity.com/facebook-instagram-blasted-for-lame-security-practices-a-21022|Warning]] | | Keybase | mobile phones and desktop PCs | Uses PGP | [[https://keybase.io/]]| | Line | | end-to-end encryption | [[https://www.lifewire.com/line-app-review-3426438|Evaluation|Warning]] | | __LinkedIn__ | | no end-to-end encryption | [[https://www.kaspersky.com/resource-center/preemptive-safety/linkedin-privacy-concerns|See discussion]]| | Meest | | end-to-end but see note. | [[https://www.linkedin.com/pulse/best-encrypted-social-media-platforms-2021-shiv-balak-kumar/|Somewhat less secure]] | | __Quora__ | | no end-to-end encryption |[[https://nordvpn.com/blog/is-quora-safe/|*]] | | **Session** | Like Signal, but no phone needed | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/session/|Evaluation]]| | Signal. | Only available via smartphone | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/|Evaluation]]| | Snapchat | | |[[https://stealthoptional.com/news/is-snapchat-encrypted-how-secure-is-snapchat-messaging/|Evaluation]]| | Tails | Complete Linux OS on your PC | ultra-secure;possession đŸ˜Ÿ| [[Tails_Details]]| | __Telegram__ | | end-to-end encryption. |[[https://restoreprivacy.com/secure-encrypted-messaging-apps/telegram/|Problems]]| | Threema | Works on iPads & smartphones | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/threema/ |Evaluation]]| | __Quora__ | | no end-to-end encryption | [[https://www.forbes.com/sites/thomasbrewster/2022/12/07/elon-musk-said-twitter-needed-encrypted-messages-its-on-hold/ sh=29dee09e9f93|*]] | | WhatsApp | Only available via smartphone | end-to-end encryption | [[https://www.businessinsider.com/guides/tech/is-whatsapp-safe|Evaluation]]| | Wire | Multiple platforms | end-to-end encryption | [[https://restoreprivacy.com/secure-encrypted-messaging-apps/wire/|Thorough review]]| ---- It may be desirable to register for some services using a "burnable" email address. For suggestions, see: [[https://restoreprivacy.com/email/temporary-disposable/]] ---- An attempt to [[TOR-VPN-Etc|Unsnarl TOR and related security issues]]. ---- For a good discussion of security on social media, see [[https://www.linkedin.com/pulse/end-to-end-encryption-julya-ziablitseva/]] ---- The International Consortium of Investigative Journalists has a good discussion of the various ways that people desiring to leak information to them may do so with relative safety. See [[https://www.icij.org/leak/]] Communication modalities for resistance forces.\\ [[https://www.starlinkhardware.com/category/information/]] Would a mesh network be useful for secure communications in Afghanistan? See:\\ [[https://en.wikipedia.org/wiki/Bridgefy]]\\ and\\ [[https://www.bloomberg.com/opinion/articles/2022-03-13/mesh-networks-could-replace-ukraine-s-damaged-cell-service]] [[https://www.quora.com/How-helpful-has-the-Starlink-satellite-internet-been-in-Ukraine-thus-far/answer/Roland-Bartetzko?__filter__=all&__nsrc__=notif_page&__sncid__=31405572545&__snid3__=42345467136|Communication modalities for resistance forces.]] There is a piece of software called "Tails" that can be installed on a USB drive. After it gets properly configured, you can restart your computer, select "Tails" as your start-up drive, and then your computer operates entirely from the USB drive. When you shut down your computer and disconnect the USB drive, you will find that the USB drive retains no records pertaining to what it was last used for.If you do a web search for "How to use "tails" you will find several videos about this product.]\\ Wikipedia records that US security organizations have issued warnings about the potential misuses of this system for illegal actions. See: [[https://en.wikipedia.org/wiki/Tails_(operating_system)]] The use of TOR is not a perfect solution, but those with extreme security situations should learn about it. See: [[https://portswigger.net/daily-swig/tor-security-everything-you-need-to-know-about-the-anonymity-network|TOR and Tails]] [[https://lifehacker.com/browse-like-bond-use-any-computer-without-leaving-a-tr-5916551]] Running an instance of Ubuntu on your computer's CD drive or using a USB drive would let you work without leaving any trace of your actions on the computer. The user of this modality would not get flagged by Taliban for using TOR technology. However, unless you were using a good VPN your communications would still trace back to the point at which you went on-line. See: [[https://www.techtarget.com/searchdatacenter/definition/Debian]] Another kind of software is called Ricochet Refresh. It is a messenger that goes through TOR. I have tried to experiment with it. It is notably lacking in on-line tutorial stuff. Here are some things I found out. [[RicochetReminders|Hints on getting Ricochet Refresh up and running.]] For the future, and also because this site gives good overbite on how https: works to keep communications cryptic from when things leave your computer to when they enter the other guy's computer, see [[https://physicsworld.com/a/the-dream-of-a-quantum-internet-is-closer-than-you-might-think/?Campaign+Owner=&utm_campaign=14290-55456&utm_content=Image%3A%20The%20dream%20of%20a%20‘quantum%20internet’%20is%20closer%20than%20you%20might%20think%20-%20explore%20more&utm_term=&utm_medium=email&utm_source=iop|Quantum Cryptography Is On The Way]] ---- ====MESHTASTIC==== [[https://www.youtube.com/watch?v=DumgHz56IjI]]