Private Communication Guidance

This page is informational only and not legal advice.

Quick Steps

Informational-Only Disclaimer

This guide offers education, not guarantees. Match each step to your risk level and local laws.

Threat Modeling in Three Questions

Plain Language: Encryption & Metadata

End-to-end encryption hides message content from the service provider. It does not hide who you talk to, when you talk, your device type, or your network. Location tags in photos and contact lists can reveal patterns even without message content.

Messaging Choices

Safer defaults

Use with caution

  • SMS/Text: Unencrypted; avoid for sensitive info.
  • Email: Generally unencrypted unless both sides use strong encryption.
  • Social DMs: Vary by platform; assume screenshots and reporting are possible.

Avoid for sensitive topics

  • Shared devices or public computers.
  • Open Wi-Fi without a VPN.
  • Unverified links or QR codes from strangers.

Email, Aliases & Accounts

Devices, Location & Network Hygiene

U.S. Border Considerations

Operational Habits (Short List)

Pair this guide with the Community Safety page for regroup plans and the Know Your Rights script.