Organizing Securely in a Surveillance Society
Across various digital communication strategies, from completely open to highly secure, a fundamental principle remains, similar to that of a Signal conversation: the security of information is tied to the least secure device that accesses it. As you evaluate your threat model, assess the devices and accounts within your group…