Introduction: Secure Use of Communication Technologies
Step 1: Using Social Media Securely
Disassociate your identity when using social media accounts. Create and/or be part of a collective identity. If there is a need for a personal account do not use your official credentials. Keep in mind that information posted online is collected; thus, avoid posting, sharing personal information.
Step 2: Securing Connection
If you can get a Library Card (–>The Shared Library Card), you can use computers and internet there. Check out https://arriving-in-berlin.de/, a digital map with helpful information for refugees in several languages.
Use VPN (Virtual Private Network) for any Internet related activity, by doing so you will add another layer in avoiding the traces from your searches being associated with your identity. https://ssd.eff.org/en/glossary/vpn ยท
Tor or other anonymity network will also aid in detaching your searches from your Internet identity. Internet associated activities are encripted and then the traffic is rerouted, so it cannot be associated with you and your Internet identity.
Step 3: Encrypting Your Communications
Messaging, calling, video conversations. Use Signal, open source encrypted messaging app or if you are willing to risk of the information ending up in Facebook’s hands use WhatsApp or other app using encryption.
Email. Keep in mind that all communications on Gmail are not secure; therefore, you can use encripted email services that are provided by companies, for instance, ProtonMail or depending on your tech-skills you can use PGP or GPG encryption. –> Manual how to install GPG — https://ssd.eff.org/en/module/introduction-public…
Step 4: Physical Handling/securing of the Device
Cover your smartphone and/or computer cameras with a sticker, a tape, a chewing gum, etc.
Internalise the fact that your device is associated with your geolocational data. If you are taking part in a protest or participating in any kind of personal meeting that could compromise you or the person you are meeting with, do not carry the device with you.
Keep in mind that your device can be recording you at any point, so when discussing delicate matters you could take extra precautions and isolate your device from you.
If you are an holder of a phone allowing fingerprint identification, you could prevent some risks of your data being seized (at the boarder control) by not using this function.
https://www.instructables.com/id/Secure-Communication/