"Compassion hurts. When you feel connected to everything, you also feel responsible for everything. And you cannot turn away. Your destiny is bound with the destinies of others. You must either learn to carry the Universe or be crushed by it. You must grow strong enough to love the world, yet empty enough to sit down at the same table with its worst horrors." -- Andrew Boyd
I've been asked to put together a primer of sorts to educate what methods of communication are available in order to stay in touch, coordinate, and just generally communicate in situations where the sender and/or receiver wish to ensure their communications are not being intercepted, are not being tampered with, and also possibly that they not be traced back to their source and/or location, and when to use them. To that end, I am creating this thread as a central location and reference for anyone who has need of slipping something to someone else on the sly, on the down-low, or maybe just doesn't want Uncle Charlie listening in on their private conversations. I intend for this thread to be a living document, full of edits and changes as the world trundles on and I discover more about the subjects. Links may go dead. Technology may change. Laws may be rewritten. If these or other things happen, I (or presumably the admins/mods) will edit or adjust the thread as necessary (if we can). Also if anyone spots any inaccuracies or knows of any good alternatives, please chime in and they will be added/adjusted, if appropriate.
It is NOT my intent for this thread to be used as a guide on how to violate whatever laws may exist in your jurisdiction(s), but most/all of these tools are just that...tools, and as such have as much potential to be abused as they do to keep people safe. Neither I nor @Dave nor any representative of Halforums condone and/or encourage the circumvention of laws and/or protections put in place to keep people or property safe from abuse or harm. Things that are bad/wrong are still bad/wrong even if nobody can tell you're doing them, and this guide should in no way be interpreted to imply the opposite.
Now that that's all out of the way, let's begin. I will try to break this up into sections so that similar topics (and tools) can be grouped together, but first let's talk a little about common sense:
I've been asked to put together a primer of sorts to educate what methods of communication are available in order to stay in touch, coordinate, and just generally communicate in situations where the sender and/or receiver wish to ensure their communications are not being intercepted, are not being tampered with, and also possibly that they not be traced back to their source and/or location, and when to use them. To that end, I am creating this thread as a central location and reference for anyone who has need of slipping something to someone else on the sly, on the down-low, or maybe just doesn't want Uncle Charlie listening in on their private conversations. I intend for this thread to be a living document, full of edits and changes as the world trundles on and I discover more about the subjects. Links may go dead. Technology may change. Laws may be rewritten. If these or other things happen, I (or presumably the admins/mods) will edit or adjust the thread as necessary (if we can). Also if anyone spots any inaccuracies or knows of any good alternatives, please chime in and they will be added/adjusted, if appropriate.
It is NOT my intent for this thread to be used as a guide on how to violate whatever laws may exist in your jurisdiction(s), but most/all of these tools are just that...tools, and as such have as much potential to be abused as they do to keep people safe. Neither I nor @Dave nor any representative of Halforums condone and/or encourage the circumvention of laws and/or protections put in place to keep people or property safe from abuse or harm. Things that are bad/wrong are still bad/wrong even if nobody can tell you're doing them, and this guide should in no way be interpreted to imply the opposite.
Now that that's all out of the way, let's begin. I will try to break this up into sections so that similar topics (and tools) can be grouped together, but first let's talk a little about common sense:
- First and foremost, DO NOT assume your communications (or methods) are foolproof! As MC frontalot explains, Everything can be broken/hacked, given enough time and effort. EVERYTHING. The best that you can hope for is to delay the inevitable revelation of your information until such time as it is no longer of value to the people you are trying to hide it from.
- Secondly, every chain is only as good as its weakest link. You may be careful not to write anything down where it might be found, but all it takes is one careless member of a group who allows themself to be shoulder-surfed or who decides to set their phone passcode to "1111" and the whole communication network could potentially be brought down and possibly everyone connected with it, as well. Loose lips sink ships, and all that.
- And thirdly, DO NOT divulge excess/irrelevant details, or chat more often than you need to. Chatting excessively with the same people (or publicly following the same group of people across multiple social media platforms) will still indicate a relationship even if nobody can read your messages. Use aliases/handles instead of real names when possible. When discussing sensitive topics, do not discuss more than you absolutely have to. None of this "I didn't quite get the plan. Can we go over it again more slowly, and could you please speak towards this flower in my lapel?" stuff. Smartphones these days are compact and have very good microphones, and frequently come with enough storage to record literal hours of audio.
- Lastly, there is a very real possibility one (or more) of the people you are trying to communicate with may eventually be compromised, either willingly (e.g., a stool pigeon or turncoat) or unwillingly. Try to be prepared for these eventualities. Have a canary or an agreed-upon duress code so a person is able to surreptitiously reveal that they have been compromised but without arousing suspicion of their captors or anyone who may be listening in, and avoid keeping all your eggs in one basket (or on one hard drive), so to speak, so no one person has the ability to shut down or "out" the entire network.
Last edited: