Safeguard your Conversation and Shared Secrets

  1. Why do we need a secure communication tool?

  2. What constitutes secure communication?

  3. How to achieve Privacy and Anonymity?

  4. What is Secure Data Sharing?

(This section introduces participants to the basic concept of encryption and presents them with tools for communication and options for data sharing that offer protection.)

Secure Communication: Intro

Secure communication is essential when two parties wish to converse without the risk of third-party interception or eavesdropping. This necessitates communication methods that are immune to such breaches of privacy.

  1. Why do we need a secure communication tool?

Your Device Can Listen to You:

  • Your adversaries can potentially listen to your conversations by exploiting the built-in microphone in your phone and laptop/PC, particularly during regular insecure calls that are susceptible to interception.

Safeguarding Privacy and Identity:

  • Secure communication tools are crucial for safeguarding privacy and identity, particularly when individuals or their contacts are at risk. By ensuring privacy and identity protection, the threat level can be reduced, enabling individuals and networks to continue their work without fear of compromise.

Prevention of Monitoring by Authorities:

  • In situations where individuals are under constant surveillance by authorities, secure communication tools are essential for preventing access to the content of conversations, thereby maintaining privacy and confidentiality.

Keeping Platform Service Providers Out:

  • Communication platform service providers may have access to all your conversations depending on whether the platform is encrypted or the level of encryption it provides.

  • For instance, platforms like WeChat, where the service provider has a direct tie to the regime, have exposed defenders in occupied regions like Tibet and East Turkestan to detention, arrest, and sentencing for sharing and receiving information via WeChat.

  1. What constitutes secure communication?

Data security when in transit

When selecting a communication platform, it's essential to consider whether they offer encryption and the level of protection it affords to your data during transit. There are two types of encryption:

  • What is HTTPS?

HTTPS ensures the security of your data while it travels to its destination. Messages are encrypted in transit between the sender, service provider, and the receiver.

  • What is End-to-End Encryption?

End-to-end encryption ensures that only the sender and receiver can view the messages. This means that only the devices involved in the communication process can encrypt and decrypt the messages. No intermediary, including the service provider, has the ability to decrypt and access the content of the messages. The end-to-end encryption provides the highest level of privacy and security.

  1. How to achieve Privacy and Anonymity?

Choosing the right communication tool is critical, especially for users under surveillance. Prioritize platforms that offer end-to-end encryption, ensuring only you and the recipient can access the message. Additionally, platforms offering anonymity provide an ideal level of security. It's also important to consider how the platforms handle your data, including what information they collect, how it's stored, and whether it's shared with third parties. Also to consider while selecting is who is behind the platform and who can have control over them. Additionally, for censored platforms, and for enhancing layers of security and privacy, you should use Tor or any trusted or reputable VPNs.

Suggestion: (Depending on time available for the training)

  • Include the following charts in the training presentation

OR

  • Write the charts on a flipchart before the training session,

OR

  • Ask participants to name popular communication platforms they are using, write them down on the chart, and inquire if the platform provides encryption and/or anonymity.

Remember! If a platform does not provide any encryption, ignore it completely.

Secure Chat

Platform

End-to-End Encryption

Anonymity

Signal

App (desktop version available)

βœ”

Somewhat -

Although a phone no; is required to use Signal, however, you can share just your username and choose to keep your no. private

Element

App (desktop version available) and browser (web) based

βœ”

βœ”

Yes, if used with an account created without phone number or email registration.

Zom

App and browser (web) based

βœ”

βœ”

Does not require phone number or personal information for registration

Whatsapp

App (desktop version available) and browser (web) based

βœ”

βœ–

Requires phone number registration

Convene

Browser (web) based

.βœ”

End-to-End Encryption encrypted while using Private Mode

βœ”

Does not require registration

Mobile Voice Call

Platform

End-to-End Encryption

Anonymity

Data Storage

Signal

App (desktop version available)

βœ”

βœ”

Yes, if used with an account created without phone number or personal information for registration.

Does not collect any data

Whatsapp

App (desktop version available) and browser (web) based

βœ”

βœ–

Requires phone number registration

Does not store call logs on their server. Logs are stored locally on user devices. But metadata such as call duration, time of call, etc. are stored temporarily on their server.

Viber

App (desktop version available)

βœ”

βœ–

Requires phone number registration

Does not store call logs on their server. Logs are stored locally on user devices. But metadata such as call duration, time of call, etc. are stored temporarily on their server.

WeChat

App (desktop version available) and browser (web) based

βœ–

βœ–

Requires phone number registration

Does retain call and message data as well as user location information.

Video Call or Conference

Platform

End-to-End Encryption

Anonymity

Data Storage

Signal

App (desktop version available)

βœ”

βœ”

Yes, if used with an account created without phone number or personal information for registration.

Does not collect any data

Element

App (desktop version available) and browser (web) based

βœ”

βœ”

Yes, if used with an account created without phone number or email registration.

Does not store call logs but its infrastructure provider Matrix ip addresses and timestamps might be stored

Jitsi

App (desktop version available) and browser (web) based

βœ”

βœ”

Does not require phone number or personal information for registration

Does not retain user data on its servers.

Google Meet

App and browser (web) based

βœ”

βœ–

Requires phone number registration

Google stores data but it is encrypted in-transit and at rest

Whatsapp

App (desktop version available) and browser (web) based

βœ”

βœ–

Requires phone number registration

Based on its privacy policy, Whatsapp does not store message contents once delivered.

  1. What is Secure Data Sharing?

Just as maintaining high levels of privacy and anonymity is crucial for communication, it's equally important for sharing data securely. Prioritizing platforms with end-to-end encryption should be a top consideration. Additionally, there are various methods for sharing files, depending on the context and recipients, some of which involve sharing over the internet and others that do not.

Different methods for sharing file:

  • Local Sharing

    • When both the sender and receiver are in close proximity, it's advisable to avoid using the internet for file sharing. Instead, utilize nearby features available on the device for sharing files directly. This method eliminates the need for data to travel over potentially insecure networks, enhancing security and privacy.

      • Bluetooth

      • Near Field Communication (NFC)

      • AirDrop

      • SD Cards, External Hard Drives

  • App and Browser Based File Sharing Platforms

Secure Data Sharing Tools

Platform

End-to-End Encryption

Anonymity

Data Storage

Signal

(100 MB size limit)

App based

βœ”

βœ”

Yes, if used with an account created without phone number or personal information for registration.

Does not store call logs

Tresorit

App and browser (web) based

βœ”

βœ”

Yes, if used with an account created without a phone number.

Does not store user encryption keys thus Tresorit cannot access user data.

Google Drive

App and browser (web) based

βœ”

βœ–

Requires phone number registration

Google has access to all data stored but not authorized users as they are all encrypted in-transit and at-rest.

Nextcloud

(Groups can host their own nextcloud server and have more control over data.

App and browser (web) based

βœ”

βœ”

Does not require phone number or personal information for registration.

Since it’s a self-hosted file sharing platform, it does not retain user data on its server.

OnionShare

App (desktop version available)

βœ”

βœ”

Does not retain data shared through onion or user data.

Last updated