Private Communication Guidance
This page is informational only and not legal advice.
Quick Steps
- Pick one safer app per group and verify contacts in person.
- Use a long passcode, disable lock-screen previews, and enable device encryption.
- Turn off cloud backups for sensitive chats and photos.
- Keep one offline copy of vital numbers and regroup points.
Informational-Only Disclaimer
This guide offers education, not guarantees. Match each step to your risk level and local laws.
Threat Modeling in Three Questions
- What are you protecting (contacts, locations, documents)?
- Who might try to get it (scammers, employers, government, device thieves)?
- How likely is loss or seizure (routine travel, protests, storms, border crossings)?
Plain Language: Encryption & Metadata
End-to-end encryption hides message content from the service provider. It does not hide who you talk to, when you talk, your device type, or your network. Location tags in photos and contact lists can reveal patterns even without message content.
Messaging Choices
Safer defaults
- Signal: End-to-end encrypted, supports disappearing messages and safety numbers.
- WhatsApp: Encrypted; disable cloud backups and limit profile details.
- iMessage: Encrypted between Apple devices; confirm conversations stay blue (not SMS).
Use with caution
- SMS/Text: Unencrypted; avoid for sensitive info.
- Email: Generally unencrypted unless both sides use strong encryption.
- Social DMs: Vary by platform; assume screenshots and reporting are possible.
Avoid for sensitive topics
- Shared devices or public computers.
- Open Wi-Fi without a VPN.
- Unverified links or QR codes from strangers.
Email, Aliases & Accounts
- Use aliases for sign-ups that do not need your legal name.
- Create separate accounts for community organizing vs. personal life.
- Enable multi-factor authentication using an authenticator app rather than SMS when possible.
- Review account recovery options and remove outdated phone numbers.
Devices, Location & Network Hygiene
- Update operating systems and apps monthly; delete unused apps.
- Disable location services for apps that do not need it and turn off photo geotagging.
- Use Wi-Fi only when needed; prefer cellular for brief sensitive calls.
- Restart devices weekly to clear temporary data.
U.S. Border Considerations
- Border agents may search or copy device data; stating non-consent may not stop a search.
- Travel with minimal data: sign out of high-risk accounts and remove sensitive photos.
- Carry paper copies of vital contacts and regroup points.
- After crossing, change passwords and review account access logs if available.
Operational Habits (Short List)
- Confirm safety numbers or QR codes in person before sharing sensitive details.
- Use disappearing messages for locations and plans, then delete the thread.
- Keep one device powered off and charged as a travel backup.
- Schedule quarterly check-ins to rotate passwords and update regroup info.
Cross-Links
Pair this guide with the Community Safety page for regroup plans and the Know Your Rights script.