UPDATED 16/8/2020: Updated the dead Smartphone non root privacy hardening guide link with new 2.0 guide link.
Hello! Since I am a privacy advocate and help folks with threat modelling, it would be idiotic and ignorant not to have worked on such a guide for activists engaged with the protests going on in USA and other places.
This serves as a handbook, and I will improve it if there is a need (always room for improvement).
#WHAT IS A THREAT MODEL?
A threat model is simply analysing the requirements and the degree to which you need to utilise tools (in case of digital, software and hardware) for privacy in all aspects of life. It consists of:
#KNOWING THE PROTEST LOCATION AND YOURSELF
Use EFF’s guide on identification of type of surveillance (police cameras, drones, FLIR/thermal cameras).
If possible, take a covert trip yourself (or if your trusted comrade can) to the protest area before the actual protest to identify locations, area setup, objects like trees or area divisions or mini-landmarks, and prepare code words for these with your team or fellow activists secretly. You can photograph these places for better planning. Plotting 101.
Timing is key. Pre plan times you would send messages to each other, so you can keep device connectivity to a minimum. This allows for lesser chance of device comms interception.
Use masquerade eye masks, they are good enough for face recognition protection. Cheap and effective.
Wear less crafty and fashion-y clothes with complicated structures that could hinder your own mobility during running or sitting in protest area.
Someone could grab your hoodie hat to immobilise you. Wear a tight fitting T shirt or jeans with less pockets to not become an obstruction to your mobility. You get the drift.
The lighter stuff you carry on you, the more mobile you are. The lesser stuff you carry, the more independent you are.
COVID-19 instruction: wear a 3 ply mask or 3M N90xx mask to stay safe from virus breeding in crowds, do not be an idiot, keep and use 70% isopropyl alcohol sanitiser on you at all times before eating
#PROTESTOR/ACTIVIST THREAT MODEL
###Devices to use:
Get a cheap $150-200 Android you can harden, but DO NOT USE iPHONES as they comply with US government in 90% of the cases, and since iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by corporates to you. Also, they recently dropped plan for encrypting iCloud backups after FBI complained. The San Ferdandino shooter publicity stunt was completely fraudulent
I guess this should do the job. If you have any suggestions, comment on the writeup. Good luck, fight for your rights, activists!
This community is meant to advocate privacy, security and freedom in an concise manner, free of prejudice bias, free of politics, free of cultist thoughts.
Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say. - Edward Snowden
READ THE RULES
Opinions are welcome, facts more so. Attack arguments, not people. Hating, baiting, trolling, flaming will be dealt with strictly.
Discuss closed source software with caution. Advocating for it strongly (cult brigading) can be treated as violation of this rule.
Editing titles of article links is strictly prohibited, unless and until the summarisation remains accurate to the context of the article or paper. Such link post will be removed without questioning.
Targeting of any country, person or nation is strictly prohibited without valid reasoning. Evidence if not presented against the specific company/corporation/individual will be treated as personal attack and/or hate speech. This will result in a warning, then ban system.
NO PERMA BANS! Ban system will work as follows:
1 day --> 3 day --> 1 week --> 2 weeks --> 3 weeks --> 1 month --> 3 months --> 6 months
Severity of the ban system will be dealt with based on degree of violation and circumstances.
NO FACT-LESS EVIDENCES, NO FALSE RHETORIC Evidence has to be credible. The onus of this lies on the claimant. The same applies on the user who questions proven evidence. Violation of this rule will be dealt with strictly.
Copycat posts serve to litter the community, increasing quantity and decreasing quality of posts. As such, posts will be removed. Repeated attempts will receive warning.