This booklet will help you to:
Why this booklet is important:
This booklet provides an introduction to the effective use of technology for activism, with links to step-by-step guides and further information. It is written with a UK focus; we invite people to translate it to their own languages and cultures.
The tools discussed here could be of use to:
Nearly all of the tools discussed in this booklet are free software based. Free software programmers dedicate millions of hours to writing virus-free, highly secure software that respects your privacy. You may already know Firefox, OpenOffice, and GNU/Linux operating systems such as Ubuntu and Mint Linux, which are used by hundreds of millions of people worldwide.
The free software we discuss is free to use; you can also see how it works, adapt it and redistribute it freely. These rights are protected in the software's license, usually the GPL (General Public License). If you change and re-distribute free software, you must release your changes under the same license so that everyone benefits. http://ttfa.net/gpl
Free software is written by people who see software as inherently political, the goal to ensure that we retain control over our own information infrastructure. ttfa.net/freesoftware
"The long revolution is creating small federated microsocieties, true guerilla cells practising and fighting for this self-management. Effective radicality authorises all variations and guarantees every freedom." Raoul Vaneigem
The same philosophy can be applied to online network services - social networking and video sharing sites such as Facebook and YouTube. Many people are creating free network services which support federation and freedom for the information users contribute; these issues are explained in a talk by Eben Moglen, "Freedom in the Cloud". ttfa.net/freecloud
Over the last two decades the information revolution has radically changed the way political activists communicate; but alongside the new opportunities, there remains the age-old problem of how to get information to your allies confidentialy. Using an alias (or aliases) is an equally old but still effective security technique.
As long as very few people know the connection between your online and real identities, it will not be easy to discover your identity if your alias is incriminated. This requires having an email provider who will not (or cannot) disclose your personal details if they are pressured by the police. Communicating securely is everyone's business. Even if your activism is currently legal, you can help make the internet safer for everyone and help the "open web" with some of these security practices.
There has been error in communication with Booktype server. Not sure right now where is the problem.
You should refresh this page.