background preloader

Tools and tactics for your digital security

Tools and tactics for your digital security

HelloCoolWorld.com : Welcome! Mailvelope - OpenPGP for webmail | security in-a-box Mailvelope comes preconfigured to work with several webmail services, including Gmail. You can check if Mailvelope is already configured to work with your webmail provider by loging into your email account and composing new message. You should see a Mailvelope button in the upper, right-hand corner of the message area, as shown below: If you see this button, you can skip the remaining steps in this section. To make Mailvelope work with the Roundcube webmail interface used by Riseup and other providers, follow the steps below. Step 1. Step 2. Step 3. Step 4. Step 5. At the bottom of this list, you should see a new entry for mail.riseup.net. Step 6. Step 7. Step 8. Step 8. Your browser will once again display a screen containing a List of E-mail Providers. Step 9. Step 10. You should see a Mailvelope button in the upper, right-hand corner of the message area, as shown below:

15 plantas medicinales que arruinarían las farmacéuticas - Mundoamores La venta de medicamentos es un gran negocio. Las empresas farmacéuticas invierten cada año miles de millones de euros en publicidad, financiación de revistas científicas, congresos, regalos y conferencias bien pagadas para conseguir que los médicos receten sus productos. El resultado es que se consumen muchos más medicamentos de los necesarios. Hasta un 95% es prescindible, según explica el director del Centro Nórdico Cochrane, Peter C. Gøtzsche, en Medicamentos que matan y crimen organizado. Los trastornos de salud más comunes pueden tratarse con terapias seguras, como las plantas medicinales. Menta Los analgésicos son los medicamentos más vendidos. Regaliz Los antiácidos, cuyas ventas no dejan de crecer año tras año, tienen efectos secundarios. Sol de oro Los antihistamínicos son la solución médica más frecuente contra la alergia. Semillas de zaragatona Los laxantes son una de las aficiones nacionales. Hipérico Espino albar Valeriana Ginseng Címifuga Ajo Ortiga Diente de León Lavanda Ginkgo biloba

Free and Open Source Software Applications that are safe and useful for unionists, labour and social justice activists | NetwOrganisation N-1: N-1 is an online social network software. It has been developed by Indignados from Spain and elsewhere collectively. N-1 combines many of the below tools in it. Other important free and open source online networks are Diaspora, Rise Up, Drupal. Big Blue Button is an open source online software built originally for higher and long distance education purpose. Mumble is a free telecommunication software that is used by Occupy movement, Spanish Indignados/15M activists. Turtle is a free and open source anonymous peer-to-peer network project facilitating free speech and sharing information by combining encryption with peer-to-peer (P2P) technology. Webchat Free Node: Safe and secure instant chat rooms for activists who are sharing and working on collective projects and actions. Online collective document creation: Titan Pad / RiseUp Pad / Priate Pad WordPress is web software you can use to create a beautiful website or blog. Other usefull FOSS tools: Address Book Audio Tools Bulletin Board

Android - riseup.net Getting and Installing Bitmask There are two ways to obtain the Bitmask Android client, the first one is to download directly from the Bitmask website and the second is to download it through the Play Store. This first one means you will have to manually download any updates to the client. The second that you are letting Google live on your device. We recommend for now to use the direct download method. Downloading and installing Bitmask for Android You can download the latest version of Bitmask for Android from the following url or read the following QR code from your device: To install you have mark the “Unknown sources” option in Android Settings -> Security -> “Unknown sources”. Getting Bitmask through the Play Store Search for Bitmask on the Play store, or visit the following url from your device Using Bitmask for the first time After that, open your just installed Bitmask app.

Las 230 plantas medicinales más efectivas y sus usos. COMPÁRTELO PARA QUE SE SEPA! Las plantas medicinales se han usado desde la mas remota antiguedad como tratamiento para sanar y tratar las emfermedades que ha lo largo de la historia el hombre ha combatido , para que su salud no fuera mermada.En la actualidad, sus principios activos son los protagonistas de la mayoria de los medicamentos de las industrias farmaceouticas y de los mas modernos estudios contra el cancer como es el caso de la curcuma. Plantas medicinales: A Plantas medicinales: B Bardana raíz: Antibiótico, antiséptico, cistitis, antibacteriano, depura la sangre.Boldo hojas seleccionadas: Muy antioxidante, reparador del hígado vesícula, digestivo.Bolsa de pastor: Regula el flujo menstrual, por exceso por defecto de esta, varices.Borraja planta: Depurativa, sudorífica, expectorante, buena para catarros la tos.Brezo flor: Acciones vías urinarias, gota, edemas, hipertensión, encías sangrantes (gingivitis). Plantas medicinales: C Plantas medicinales: D Plantas medicinales: E Plantas medicinales: F Comentarios

GPS bracelet uses social media to protect Civil Rights Activists The Civil Rights Defenders have issued their first batch of GPS bracelets that will alert the CRDs' headquarters, other nearby activists, and the entirety of the CRDs' social media following if the bracelet's owner is ever kidnapped. The first 5 bracelets were issued from April 2nd through April 5th during the Civil Rights Defenders' conference, Defenders' Days. The CRD plans on issuing 55 of these bracelets over the next year and a half. The bracelets are described as a personal alarm, and the product is called the "Natalia Project". It was named after Natalia Estemirova, a human rights defender who, in 2009, was murdered within 24 hours of being kidnapped. The GPS bracelet can be activated manually, or if an attacker forcefully removes it from the activist's wrist. The Civil Rights Defenders state that these bracelets could potentially alert hundreds of thousands of people instantly.

How Mesh Networking Empowers Mobile Activism Mobile activism has proven to be a cornerstone of modern tactics used to hold governments and organizations accountable. Yet as we have seen multiple times across the globe in recent years, when large scale protests erupt, or governments feel threatened, the result is sometimes the shutdown of mobile networks. These events can have substantial impacts felt across the economy, services digital and physical, not to mention the obvious massive communication disruptions. Such events have even led groups to look into recognizing mobile network access as a fundamental human right. Where there is a will, there is a way, and clever protesters in China have found a way to get around mobile network shutdowns aimed at disrupting their ability to organize protests. A Network In Your Pocket Aside from impeding communications efforts altogether, activists also live with the concern that their communications might be monitored by authorities. Mesh Networking on Mobile A Chain of Tiny Networks

New Tactics in Human Rights gpg4usb - email and file encryption | security in-a-box Before you can begin encrypting and decrypting email, text messages, documents and files, you must take two preparatory steps: first you need to generate or import your encryption key pair and second you need to send your public key to your contacts and receive their public keys and import them to your key ring. We describe how to share public keys on the next page. gpg4usb assist you with generating your key pair on the first start of the program. Note that you can always come back to Getting Started window from the Help -> Open Wizard menu. Step 1. To run the gpg4usb program for the first time , find and double click to open the gpg4usb folder and then double click . Step 2. Figure 2: Choose your Action Note the other options to import existing keys available on the First Start Wizard screen. Step 3. Figure 3: Create New Key Step 4. Figure 4: An example of a completed Generate Key form Important: Note: You do not need to use your real name and real email address when generating your key.

Zoetica Media - Communication Services for Nonprofits & Social Good Privacy and security basics | Me and my Shadow There's no such thing as 'perfect privacy' or 'perfect security', but there are a few simple things you can do to keep your content, communications and web browsing more private and more secure. Keep your devices clean and healthy It's important to keep your operating system, software and apps updated. When updates become available, they often include security fixes. Security in a box ( - tools and tactics for your digital securityCertcheck Me ( - helps you understand security warnings in your browserOnonymous ( - a collection of materials used to learn about, and train others in, digital security

SocialButterfly Mobiles in-a-Box

Related: