Secure Communication Methods: Privacy Tools & Techniques
Series: 90-Day Survival Guide Sprint — Guide #8
Category: Preparation / OPSEC
Difficulty: Intermediate
Last Updated: April 2, 2026
When This Matters
Secure communication becomes critical during:
| Situation | Why Secure Communication Matters |
|---|---|
| Political organizing | Protecting members from retaliation |
| Journalistic work | Protecting sources and sensitive information |
| Harassment/stalking | When abusers monitor communications |
| Legal proceedings | Attorney-client privileged communications |
| Personal safety | When location or plans must remain private |
| Civil unrest | Coordinating safety without surveillance |
The Reality: Most everyday communication is not secure. SMS, email, and social media can be read by providers, subpoenaed, or hacked.
Recommended Secure Apps
| App | Encryption | Metadata Protection | Best For |
|---|---|---|---|
| Signal | End-to-end | Minimal | General secure messaging |
| Session | End-to-end | Strong (no phone number) | Maximum anonymity |
| Briar | End-to-end | Strong (P2P, offline) | Protest/off-grid scenarios |
| Element/Matrix | End-to-end | Configurable | Decentralized communication |
Apps to Avoid for Sensitive Communication
- SMS/Text Messages - No encryption, stored by carrier
- Facebook/Instagram DMs - Meta collects metadata
- Twitter/X DMs - Not encrypted
- Discord - Not E2EE, company can access
- Telegram (default) - Not E2EE, only Secret Chats are encrypted
Step 1: Set Up Signal
- Download from signal.org
- Register with phone number
- Configure privacy settings:
- Read receipts: OFF
- Typing indicators: OFF
- Phone number visibility: Nobody
- Use disappearing messages for sensitive conversations
Step 2: Anonymous Communication (Session)
- No phone number required
- Routes through onion network
- Download from getsession.net
- Save Session ID securely
Step 3: Device Security
| Practice | Why It Matters |
|---|---|
| Strong passcode | Prevents physical access |
| Disable biometrics | Cant be forced to unlock with face/fingerprint |
| Full disk encryption | Protects data if device seized |
| Keep apps updated | Security patches fix vulnerabilities |
Step 4: Communication Discipline
- Assume all comms are monitored
- Never discuss sensitive topics on insecure channels
- Dont screenshot sensitive messages
- Clear message history regularly
- Verify identity out-of-band
Emergency Communication Plans
When Normal Channels Fail
| Method | Range | Requirements |
|---|---|---|
| Mesh messaging | ~100m | App installed |
| Two-way radios | 2-5 miles | Radio, license |
| HAM radio | Miles to global | License, equipment |
Family Plan
- Designate out-of-area contact
- Establish meeting points (primary + backup)
- Agree on check-in times
- Create code words for emergencies
- Write down important numbers
Common Mistakes to Avoid
- Using SMS for sensitive info
- Not verifying contacts
- Screenshots of sensitive messages
- Biometric unlock on sensitive devices
Required Tools Checklist
Essential
- Signal installed and configured
- Strong device passcode
- Disappearing messages enabled
Recommended
- Session for anonymous communication
- ProtonMail or Tutanota account
- Two-way radios for family
Sources
- EFF Surveillance Self-Defense: https://ssd.eff.org
- Signal Security Guide: Signal >> Government Communication
This is Guide #8 of the 90-Day Survival Guide Sprint.
Tags: opsec, communication, privacy, encryption, intermediate