Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Check your Copilot settings after this confidential email bug

Check your Copilot settings after this confidential email bug

19 February 2026
The Google Pixel 10a Is Barely Different From the Pixel 9a

The Google Pixel 10a Is Barely Different From the Pixel 9a

19 February 2026
Snapseed update brings retro film camera vibes and manual controls to your iPhone

Snapseed update brings retro film camera vibes and manual controls to your iPhone

19 February 2026
Facebook X (Twitter) Instagram
Just In
  • Check your Copilot settings after this confidential email bug
  • The Google Pixel 10a Is Barely Different From the Pixel 9a
  • Snapseed update brings retro film camera vibes and manual controls to your iPhone
  • How to Organize Safely in the Age of Surveillance
  • AI chatbots with web browsing can be abused as malware relays
  • Review: Bowers & Wilkins Px7 S3 Headphones
  • Google Maps tests hiding reviews and images unless you sign in
  • Inside the Gay Tech Mafia
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » How to Organize Safely in the Age of Surveillance
News

How to Organize Safely in the Age of Surveillance

News RoomBy News Room19 February 20264 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
How to Organize Safely in the Age of Surveillance
Share
Facebook Twitter LinkedIn Pinterest Email

For all these approaches, from the fully public to the paranoid, the same principle applies as in a Signal conversation: A piece of information is only as secure as the least secured device that accesses it. So as you consider your threat model and whose devices and accounts within your group have access to your most sensitive data, make sure they’re appropriately locked down: That means full-disk encryption—here’s a breakdown for Windows and Mac—strong passwords (we recommend a password manager), and multifactor authentication on all accounts for both cloud- and self-hosted services.

TLDR: A growing spectrum of collaboration approaches offer a range of options: from insecure-but-accessible Google Docs, to end-to-end encrypted or self-hosted tools like Proton and CryptPad, to storing and editing files locally and sharing them over Signal. Choose what works best for you based on your threat model.

Meet IRL Safely

If you’re in the same region as people you’re organizing with, does it make sense to bypass all of these digital gymnastics and just hang out? In many cases the answer is a resounding yes, experts told WIRED—but there are caveats here, too. First you should do the same threat model evaluation for in-person meetings that you did for your digital organizing: Is the association between you and the people you would be meeting already public? Or is it a secret that you know each other and work together? Carry out this same evaluation for the location where you would meet and anywhere else you would go together, just as you would for where and how you host sensitive data.

If you cannot be spotted together or be seen coming or going from a secret or sensitive location, meeting in person may not offer privacy benefits. You could be observed by bystanders, followed by law enforcement, or tracked via cell phone data, surveillance cameras, face recognition, automatic license plate readers, or any of the myriad ways that you can be surveilled in the physical world.

Just as with your threat model assessment for your data, there are no doubt plenty of situations where your affiliation is already public or non-sensitive—meeting people you know from your neighborhood, for example, or people you regularly volunteer with through a religious group, labor union, or other non-secret organization. If you can be seen together without giving away anything sensitive, experts emphasize that in-person meeting is one of the most valuable and potentially secure ways to collaborate.

“The communication that people have together physically can never be replaced, and I champion it,” Freedom of the Press Foundation’s Holmes says. “I would like to say that the best encryption is the noisy bar where you’re whispering to somebody. But we always do have to think about surveillance architecture, which is incredibly prevalent.”

TLDR: Meeting in person eliminates many technical vulnerabilities that could compromise your organization’s privacy and security. But consider your threat model: If the very fact of your meeting needs to stay a secret, physical surveillance can make in-person meetings just as–or even more—risky than digital communications.

Assess, Then Act

The truth, says Distribute Aid’s Taylor Fairbank, is that all organizing that runs counter to the interests of the powerful, digital or physical, carries a threat of surveillance and its consequences. “There’s always going to be some inherent risk to helping other people, unfortunately,” says Fairbank. “That’s the reality that we live in, so think about what you’re doing. Build your own threat model. And if you’re not willing to accept the inherent risks of doing something, then don’t do it.”

But Fairbank also says that those considerations shouldn’t prevent people from acting. “Look at the risk in context, make informed choices, try to be as safe as possible,” says Fairbank. “But, my God, go out there and help people. Because we need it.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI chatbots with web browsing can be abused as malware relays
Next Article Snapseed update brings retro film camera vibes and manual controls to your iPhone

Related Articles

Check your Copilot settings after this confidential email bug
News

Check your Copilot settings after this confidential email bug

19 February 2026
The Google Pixel 10a Is Barely Different From the Pixel 9a
News

The Google Pixel 10a Is Barely Different From the Pixel 9a

19 February 2026
Snapseed update brings retro film camera vibes and manual controls to your iPhone
News

Snapseed update brings retro film camera vibes and manual controls to your iPhone

19 February 2026
AI chatbots with web browsing can be abused as malware relays
News

AI chatbots with web browsing can be abused as malware relays

19 February 2026
Review: Bowers & Wilkins Px7 S3 Headphones
News

Review: Bowers & Wilkins Px7 S3 Headphones

19 February 2026
Google Maps tests hiding reviews and images unless you sign in
News

Google Maps tests hiding reviews and images unless you sign in

19 February 2026
Demo
Top Articles
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024110 Views
Costco partners with Electric Era to bring back EV charging in the U.S.

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202498 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Review: Bowers & Wilkins Px7 S3 Headphones News

Review: Bowers & Wilkins Px7 S3 Headphones

News Room19 February 2026
Google Maps tests hiding reviews and images unless you sign in News

Google Maps tests hiding reviews and images unless you sign in

News Room19 February 2026
Inside the Gay Tech Mafia News

Inside the Gay Tech Mafia

News Room19 February 2026
Most Popular
The Spectacular Burnout of a Solar Panel Salesman

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025137 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024110 Views
Our Picks
How to Organize Safely in the Age of Surveillance

How to Organize Safely in the Age of Surveillance

19 February 2026
AI chatbots with web browsing can be abused as malware relays

AI chatbots with web browsing can be abused as malware relays

19 February 2026
Review: Bowers & Wilkins Px7 S3 Headphones

Review: Bowers & Wilkins Px7 S3 Headphones

19 February 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.