June 4, 2020
In a world where millions of digital communications are silently intercepted, collected, and stored every day, how do activists effectively say “I do not consent to this search?” As in a physical encounter with law enforcement, we must be proactive. Online, this means using encryption along with other privacy-protecting and autonomy-preserving tools.
Our choice of tools is of vital importance—corporate digital infrastructure that may be convenient to use can be relied upon to snitch on anyone accused of making trouble for government agencies and exploitative or toxic industries. Community-driven, trustworthy, and proven digital security tools exist, but can require a sometimes steep learning curve. Also, all technologies have certain limitations. Knowing exactly what these are is crucial to using them safely and effectively.