Survival Guide #8: Secure Communication Methods - Privacy Tools & Techniques

Secure Communication Methods: Privacy Tools & Techniques

Series: 90-Day Survival Guide Sprint — Guide #8
Category: Preparation / OPSEC
Difficulty: Intermediate
Last Updated: April 2, 2026


When This Matters

Secure communication becomes critical during:

Situation Why Secure Communication Matters
Political organizing Protecting members from retaliation
Journalistic work Protecting sources and sensitive information
Harassment/stalking When abusers monitor communications
Legal proceedings Attorney-client privileged communications
Personal safety When location or plans must remain private
Civil unrest Coordinating safety without surveillance

The Reality: Most everyday communication is not secure. SMS, email, and social media can be read by providers, subpoenaed, or hacked.


Recommended Secure Apps

App Encryption Metadata Protection Best For
Signal End-to-end Minimal General secure messaging
Session End-to-end Strong (no phone number) Maximum anonymity
Briar End-to-end Strong (P2P, offline) Protest/off-grid scenarios
Element/Matrix End-to-end Configurable Decentralized communication

Apps to Avoid for Sensitive Communication

  • SMS/Text Messages - No encryption, stored by carrier
  • Facebook/Instagram DMs - Meta collects metadata
  • Twitter/X DMs - Not encrypted
  • Discord - Not E2EE, company can access
  • Telegram (default) - Not E2EE, only Secret Chats are encrypted

Step 1: Set Up Signal

  1. Download from signal.org
  2. Register with phone number
  3. Configure privacy settings:
    • Read receipts: OFF
    • Typing indicators: OFF
    • Phone number visibility: Nobody
  4. Use disappearing messages for sensitive conversations

Step 2: Anonymous Communication (Session)

  • No phone number required
  • Routes through onion network
  • Download from getsession.net
  • Save Session ID securely

Step 3: Device Security

Practice Why It Matters
Strong passcode Prevents physical access
Disable biometrics Cant be forced to unlock with face/fingerprint
Full disk encryption Protects data if device seized
Keep apps updated Security patches fix vulnerabilities

Step 4: Communication Discipline

  • Assume all comms are monitored
  • Never discuss sensitive topics on insecure channels
  • Dont screenshot sensitive messages
  • Clear message history regularly
  • Verify identity out-of-band

Emergency Communication Plans

When Normal Channels Fail

Method Range Requirements
Mesh messaging ~100m App installed
Two-way radios 2-5 miles Radio, license
HAM radio Miles to global License, equipment

Family Plan

  1. Designate out-of-area contact
  2. Establish meeting points (primary + backup)
  3. Agree on check-in times
  4. Create code words for emergencies
  5. Write down important numbers

Common Mistakes to Avoid

  • Using SMS for sensitive info
  • Not verifying contacts
  • Screenshots of sensitive messages
  • Biometric unlock on sensitive devices

Required Tools Checklist

Essential

  • Signal installed and configured
  • Strong device passcode
  • Disappearing messages enabled

Recommended

  • Session for anonymous communication
  • ProtonMail or Tutanota account
  • Two-way radios for family

Sources


:books: This is Guide #8 of the 90-Day Survival Guide Sprint.

Tags: opsec, communication, privacy, encryption, intermediate