Safeguard your Conversation and Shared Secrets
Why do we need a secure communication tool?
What constitutes secure communication?
How to achieve Privacy and Anonymity?
What is Secure Data Sharing?
(This section introduces participants to the basic concept of encryption and presents them with tools for communication and options for data sharing that offer protection.)
Secure Communication: Intro
Secure communication is essential when two parties wish to converse without the risk of third-party interception or eavesdropping. This necessitates communication methods that are immune to such breaches of privacy.
Why do we need a secure communication tool?
Your Device Can Listen to You:
Your adversaries can potentially listen to your conversations by exploiting the built-in microphone in your phone and laptop/PC, particularly during regular insecure calls that are susceptible to interception.
Safeguarding Privacy and Identity:
Secure communication tools are crucial for safeguarding privacy and identity, particularly when individuals or their contacts are at risk. By ensuring privacy and identity protection, the threat level can be reduced, enabling individuals and networks to continue their work without fear of compromise.
Prevention of Monitoring by Authorities:
In situations where individuals are under constant surveillance by authorities, secure communication tools are essential for preventing access to the content of conversations, thereby maintaining privacy and confidentiality.
Keeping Platform Service Providers Out:
Communication platform service providers may have access to all your conversations depending on whether the platform is encrypted or the level of encryption it provides.
For instance, platforms like WeChat, where the service provider has a direct tie to the regime, have exposed defenders in occupied regions like Tibet and East Turkestan to detention, arrest, and sentencing for sharing and receiving information via WeChat.
What constitutes secure communication?
Data security when in transit
When selecting a communication platform, it's essential to consider whether they offer encryption and the level of protection it affords to your data during transit. There are two types of encryption:
What is HTTPS?
HTTPS ensures the security of your data while it travels to its destination. Messages are encrypted in transit between the sender, service provider, and the receiver.
What is End-to-End Encryption?
End-to-end encryption ensures that only the sender and receiver can view the messages. This means that only the devices involved in the communication process can encrypt and decrypt the messages. No intermediary, including the service provider, has the ability to decrypt and access the content of the messages. The end-to-end encryption provides the highest level of privacy and security.
How to achieve Privacy and Anonymity?
Choosing the right communication tool is critical, especially for users under surveillance. Prioritize platforms that offer end-to-end encryption, ensuring only you and the recipient can access the message. Additionally, platforms offering anonymity provide an ideal level of security. It's also important to consider how the platforms handle your data, including what information they collect, how it's stored, and whether it's shared with third parties. Also to consider while selecting is who is behind the platform and who can have control over them. Additionally, for censored platforms, and for enhancing layers of security and privacy, you should use Tor or any trusted or reputable VPNs.
Remember! If a platform does not provide any encryption, ignore it completely.
Secure Chat
Mobile Voice Call
Video Call or Conference
What is Secure Data Sharing?
Just as maintaining high levels of privacy and anonymity is crucial for communication, it's equally important for sharing data securely. Prioritizing platforms with end-to-end encryption should be a top consideration. Additionally, there are various methods for sharing files, depending on the context and recipients, some of which involve sharing over the internet and others that do not.
Different methods for sharing file:
Local Sharing
When both the sender and receiver are in close proximity, it's advisable to avoid using the internet for file sharing. Instead, utilize nearby features available on the device for sharing files directly. This method eliminates the need for data to travel over potentially insecure networks, enhancing security and privacy.
Bluetooth
Near Field Communication (NFC)
AirDrop
SD Cards, External Hard Drives
App and Browser Based File Sharing Platforms
Secure Data Sharing Tools
Last updated