Secure data transfer #guide for #paranoid journalists and hacktivists ...

Prologue (Why we live in the dark #digital age!)

The #Pegasus #scandal showed that no one took #Snowden's revelations seriously. Meanwhile, it is not only the state actor #NSA that monitors everyone but a private company in #Israel the #NSO Group. Of course, always installing the latest updates on the device is of no use if the #intelligence agencies withhold the #security vulnerabilities from us, which does not increase security but endangers it.

The #problem is that today, even with a degree in #computer science, it is almost impossible to keep an overview of the entire security situation, as it has become far too complex. You would need a very simple tool, where the wrong usage is almost impossible. A #laptop or #smartphone is out of the question because even experts can only detect manipulated #firmware in complicated, time-consuming processes.

Solution

In order not to be monitored digitally, one works as analog as possible at the destination. Records are handwritten on paper, which is not left unattended anywhere. For the transmission of the records to the headquarter, they are photographed with a digital camera and stored on an SD card. This SD card is then inserted into a #RaspberryPi where the images are encrypted. The Raspberry Pi connects to the #darknet (VPN, i2p or TOR) via the smartphone's #wifi. From this file drop in the darknet, the headquarters can download the data. Afterwards, you should destroy all records and the SD card so that no contaminating data can be found during a police search.

The choice of darknet must be adapted to the destination country. Special bridges are needed to tunnel through the great firewall of China. Instead of using your own smartphone to connect to the #Internet, it's better to use a free WiFi connection if one is available. A micro SD card is easy to hide. It can be smuggled into a neighboring country by a trusted person and the transfer can take place there. This means that no suspicious electronic traces lead back to you.


#journalism #freedom #press #humanrights #surveillance #news #internet #activism #instructions #i2p #TOR #vpn #encryption #hacktivism #policestate #protest #economy #politics #exploit #cyberwarfare