Skip to content

Security training: Organizers and Journalists versus Random Assholes

fabacab edited this page Feb 14, 2021 · 7 revisions

WikiSecurity culturePersona-based training matrixSecurity training: Organizers and Journalists versus Random Assholes

How to use this persona-based threat modeling matrix:

  1. You are a "defender" (a given row). Find yourself there.
  2. Your concern(s) map to a given "attacker" (a given column). Find your attacker.
  3. Find the cell at which these two personas intersect. Everything listed in the cells above and to the left of your cell applies to you, too.
  4. Start at the top-left cell and read the advice from left-to-right, top-to-bottom, until you reach your cell. Then stop worrying. :)
Attackers
Random Assholes Assholes with Resources The State
Defenders Individuals Individuals vs Random Assholes Individuals vs Assholes with Resources Individuals vs The State
Organizers and Journalists Organizers & Journalists vs Random Assholes Organizers & Journalists vs Assholes with Resources Organizers & Journalists vs The State
Targeted Activists Targeted Activists vs Random Assholes Targeted Activists vs Assholes with Resources Targeted Activists vs The State

Organizers and Journalists versus Random Assholes

Prerequisites

Before you dive too deeply into this practice material, you should first explore the following lower-hanging fruit:

  1. Security training: Individuals versus Random Assholes

Practices

  • Use a WHOIS privacy ("Domain privacy") service (or, if you're okay taking the small risk, provide inaccurate WHOIS information)
  • 2FA (on your own accounts and, if you're running a group blog, on your blog site, etc.)
  • Use Signal to share phone-size files with other Signal users. For larger caches, use OnionShare/TorBrowser or share.RiseUp.net or Magic Wormhole to share files rather than public Dropbox/Google Docs, etc.
Clone this wiki locally