Encryption for the Earthbound
In a world where every message is scanned, every movement tracked, every relationship graphed by algorithms of control, privacy is not secrecy—it's survival. Encryption is the armor that protects the vulnerable, the shield that lets the hunted communicate, the lock that keeps the state from your recipes, your plans, your people.
This is practical cryptography for those who need it: activists, organizers, the earthbound communities building alternatives to extraction and empire. No math degree required. Just the will to learn and the need to stay free.
The Threat Model: Who Are You Hiding From?
Encryption only makes sense in context. Different adversaries require different defenses.
Threat Levels
Level 1: Corporate surveillance
- Adversary: Data brokers, advertisers, tech platforms
- Goal: Profit from your behavior, manipulate your choices
- Defense: Basic encryption, privacy tools, minimal metadata exposure
- Risk: Annoyance, manipulation, profiling
Level 2: Employer/institutional monitoring
- Adversary: Bosses, school administrators, HR departments
- Goal: Control behavior, punish dissent, monitor productivity
- Defense: End-to-end encryption, compartmentalization, burner accounts
- Risk: Firing, expulsion, blacklisting
Level 3: Law enforcement
- Adversary: Local police, FBI, prosecutors
- Goal: Evidence for prosecution, intelligence gathering, disruption
- Defense: Strong encryption, metadata minimization, legal caution, security culture
- Risk: Arrest, prosecution, infiltration, harassment
Level 4: State-level adversaries
- Adversary: Intelligence agencies, military, authoritarian regimes
- Goal: Total surveillance, preemptive neutralization, suppression of movements
- Defense: Air-gapped systems, one-time pads, steganography, physical security, tradecraft
- Risk: Disappearance, torture, assassination, mass surveillance
Level 5: Active targeting
- Adversary: Nation-state with resources dedicated to your specific compromise
- Goal: Your specific communications, your network, your destruction
- Defense: Extreme compartmentalization, hardware tokens, Tails/Qubes, disposable devices, offline coordination
- Risk: Everything
Most readers face Levels 1-3. This guide addresses Levels 1-4. Level 5 requires dedicated training and operational security protocols beyond this scope.
The Basics: What Encryption Actually Does
Encryption is math that scrambles data so only authorized parties can read it. Two fundamental types:
Symmetric Encryption
One key locks and unlocks. Like a physical key—if you have it, you can open the door.
Used for: Encrypting files, disk encryption, secure messaging (in some protocols)
Examples: AES (the standard), ChaCha20 (modern alternative)
Key management challenge: How do you share the key securely? Anyone who intercepts the key can decrypt everything.
Asymmetric Encryption (Public Key)
Two keys: one public, one private. The public key encrypts; only the private key decrypts. You can share your public key widely—anyone can encrypt to you, but only you can read it.
Used for: Email encryption (PGP), secure website connections (TLS/HTTPS), cryptocurrency
Examples: RSA (older, larger keys), Ed25519/X25519 (modern, smaller keys, faster)
The magic: You never share your private key. It never leaves your device. Mathematical relationship between keys makes this work—knowing the public key doesn't help you derive the private key.
Practical Tools: What to Actually Use
Messaging: Signal
Why Signal: Open source, end-to-end encrypted by default, metadata-minimizing, nonprofit funded, widely trusted by security researchers.
How it works:
- Messages encrypted on your device, decrypted only on recipient's device
- Signal servers can't read message content
- Phone number required (privacy tradeoff for usability)
- Disappearing messages available
- Group chats encrypted
- Voice and video calls encrypted
Best practices:
- Enable disappearing messages (24 hours or less for sensitive)
- Verify safety numbers (key fingerprints) with important contacts
- Use registration lock (prevents SIM swap attacks)
- Don't back up to cloud (defeats encryption)
Limitations:
- Requires phone number (use Google Voice or similar for pseudonymity)
- Centralized servers (could be compelled to log metadata)
- Not anonymous by default
Email: PGP (Pretty Good Privacy)
Why PGP: Decentralized, no single point of failure, works with any email provider, standard for activist communications.
How it works:
- Generate keypair (public + private)
- Share public key widely (keyservers, email signature, website)
- Others encrypt to your public key
- Only your private key decrypts
- Sign messages to prove identity
Tools:
- GnuPG (GPG): The standard implementation
- Thunderbird + Enigmail: Email client with built-in PGP
- K-9 Mail + OpenKeychain: Android
- iOS: Canokey, PGP Everywhere (limited options)
Best practices:
- Keep private key offline (air-gapped device, hardware token)
- Use subkeys for daily use, keep master key secure
- Key expiration dates (can extend, limits damage if lost)
- Revocation certificate (if key compromised, publish this)
Limitations:
- Metadata not encrypted (who emailed whom, when, subject lines)
- Complex key management
- Easy to use wrong (replying unencrypted, forgetting to sign)
- No forward secrecy (if key compromised later, old messages decryptable)
File Encryption
VeraCrypt (disk/container encryption):
- Create encrypted volumes (files that mount as drives)
- Plausible deniability (hidden volumes within visible ones)
- Cross-platform
- Use case: Sensitive documents, offline backups
GPG file encryption:
gpg --encrypt --recipient [key-id] filename # Encrypt to someone
gpg --symmetric filename # Encrypt with password
LUKS (Linux disk encryption):
- Full disk or partition encryption
- Standard in most Linux distros
- Use case: Protect laptop if stolen
Browsers and Web Privacy
Tor Browser:
- Routes traffic through volunteer relays, hiding origin
- Access .onion hidden services
- Defends against traffic analysis
- Slower, but private
- Use case: Researching without attribution, accessing blocked sites
Firefox + Privacy Badger + uBlock Origin:
- Blocks trackers
- HTTPS Everywhere (redirects to encrypted connections)
- Container tabs (isolate sites from each other)
VPNs (Virtual Private Networks):
- Encrypt traffic to VPN server
- Hides traffic from local network (coffee shop, employer)
- Hides origin from destination websites
- Does NOT anonymize (VPN provider knows who you are)
- Use case: Public wifi protection, bypassing local censorship
Important: VPNs are not magic. They shift trust from ISP to VPN provider. Free VPNs often sell your data. Paid VPNs can be compelled to log. Tor is better for anonymity; VPNs are better for convenience and local protection.
Metadata: The Data About Data
Encryption protects content. Metadata reveals everything else:
- Who you communicate with
- When and how often
- Your location
- Your device type
- Message size
- Communication patterns
Example: Even if Signal content is encrypted, Signal knows:
- Your phone number
- Who you messaged
- When
- How often
Defense strategies:
- Use multiple communication methods (don't put all eggs in one basket)
- Minimize contact list exposure
- Consider burner phones for sensitive coordination
- Air-gapped systems for most sensitive planning
- Face-to-face for highest-security discussions
Security Culture: The Human Layer
Encryption fails when people fail. Technical tools matter less than operational security.
The Principles
1. Compartmentalization: Don't mix identities, devices, or contexts.
- Separate phone for organizing vs. personal life
- Separate email for activism vs. work
- Separate social media identities
- Never cross the streams
2. Need-to-know: Only share information with those who need it.
- Don't tell comrades details they don't need
- Don't document what doesn't need documenting
- Don't put names to roles unnecessarily
3. Verify, then trust: Confirm identity before sharing sensitive information.
- Meet in person to verify Signal safety numbers
- Use out-of-band verification (phone call to confirm key)
- Watch for changes in keys (compromise indicator)
4. Assume compromise: Act as if your communications are being monitored.
- Don't put in writing what you wouldn't say in court
- Don't assume encryption is perfect
- Plan for key compromise
5. No boasting: Security culture includes shutting down inappropriate talk.
- "Don't ask, don't tell" for sensitive actions
- Challenge people who overshare
- Remove people who can't maintain security
What Not to Do
Don't:
- Talk about illegal activities over unencrypted channels
- Store sensitive documents unencrypted
- Use the same password everywhere
- Click suspicious links (phishing attacks)
- Trust new people immediately
- Use biometrics for device unlocking (can be compelled)
- Post about ongoing operations
- Bring phones to sensitive meetings (leave in Faraday bag or elsewhere)
- Forget that your metadata is being collected
Advanced Techniques
Steganography
Hiding messages in plain sight—images, audio files, even text.
Use cases:
- Getting messages past censors
- Publishing whistleblower materials
- Coordination under total surveillance
Tools:
- Steghide: Embed data in images
- OpenStego: Cross-platform steganography
- Outguess: Statistical steganography (harder to detect)
Important: Steganography provides plausible deniability, not strong encryption. If suspected, messages can be extracted. Combine with encryption (encrypt first, then hide).
One-Time Pads
Unbreakable encryption—if used correctly.
Requirements:
- Key as long as the message
- Key truly random
- Key never reused
- Key destroyed after use
In practice: Almost never practical for digital communications. Physical exchange of pads required beforehand. Used for highest-security embassy communications, spycraft.
Air-Gapped Systems
Computers never connected to the internet.
Use case: Highest security—generating keys, storing secrets, planning sensitive operations.
Setup:
- Old laptop, remove wifi/bluetooth cards
- Boot from Tails USB (amnesic live OS)
- Generate keys, store on encrypted USB
- Transfer files via sneaker-net (physical USB movement)
- Never connect to network
Security: No remote compromise possible. Physical access required to breach.
Plausible Deniability
Hiding that you're hiding something.
VeraCrypt hidden volumes:
- Outer volume with innocent files
- Inner hidden volume with sensitive files
- Different passwords for each
- If compelled to decrypt, show outer volume, keep hidden volume secret
Deniable encryption: Don't use standard encryption headers that announce "encrypted data here."
Dead Drops and Cutouts
Offline communication methods:
Dead drops: Physical location to leave messages—hollowed rocks, magnetic containers, etc. Pre-arranged locations, check for surveillance, leave nothing traceable.
Cutouts: Intermediaries who relay messages. Don't know content, just pass along. Compartmentalizes communication chains.
One-time pads: Written messages using pre-shared keys. Burn after reading.
Organizational Security
For Groups and Collectives
Role-based access:
- Different levels of access to different information
- Need-to-know strictly enforced
- Technical role for security decisions
Secure meetings:
- No phones in the room (Faraday bags or left outside)
- Sweep for recording devices if high-risk
- Designated note-taker, encrypted notes
- No minutes for sensitive decisions
Secure file sharing:
- Nextcloud with end-to-end encryption
- OnionShare (Tor-based file sharing)
- Physical encrypted drives for large files
Incident response:
- Plan for compromise: who does what, how to communicate breach, rotating keys
- Practice drills
- Learn from mistakes without blame
Signal Groups Best Practices
Group creation:
- Use ephemeral groups for actions
- Disappearing messages mandatory
- No real names in group names or member names
- Verification of all members
Group hygiene:
- Kick inactive members
- Rotate groups periodically
- Assume group membership is known
- Don't discuss active operations in long-standing groups
Legal Considerations
Encryption is legal (mostly):
- US: Legal to use, legal to develop
- Some countries restrict: China, Russia, parts of Middle East
- "Key disclosure laws": UK, Australia can compel decryption
- Crossing borders: Devices may be searched, encryption may trigger secondary screening
If questioned:
- Don't lie to federal agents (crime)
- Don't answer questions (right to remain silent)
- Ask for lawyer
- Don't decrypt voluntarily (creates precedent)
Border crossings:
- Travel with minimal devices
- Use burner devices
- Wipe sensitive data before crossing (restore from cloud after)
- Consider that devices may be cloned
The Philosophy of Earthbound Encryption
The state wants total information awareness. Corporations want total consumer profiling. Employers want total worker surveillance. Encryption is the resistance—the technical assertion that some thoughts, some plans, some relationships belong only to those involved.
Encryption as mutual aid: Sharing knowledge of secure tools is like sharing seeds or recipes. It strengthens the network.
Encryption as prefiguration: Building the secure communication infrastructure we want to exist, practicing the privacy norms we want normalized.
Encryption as survival: For the hunted, the hunted, the organizers, the heretics—encryption is not abstract. It's the difference between freedom and cage.
The encryption is not the point: The point is what it enables—free assembly, free speech, free association, in an age of total surveillance. The tools are means. Liberation is the end.
Quick Start: Get Secure Today
Install immediately:
- Signal (messaging)
- VeraCrypt (file encryption)
- Firefox + Privacy Badger + HTTPS Everywhere
Configure today:
- Full-disk encryption on all devices
- Password manager (Bitwarden, KeePassXC)
- Unique strong passwords for everything
- Two-factor authentication (TOTP, not SMS)
Practice this week:
- Verify Signal safety numbers with important contacts
- Encrypt a file with GPG, send to comrade, have them decrypt
- Set up disappearing messages
- Establish security culture with your group
Maintain always:
- Software updates (security patches)
- Regular key rotation
- Security culture reminders
- Assume compromise, plan accordingly
Resources
Tools:
- Signal: signal.org
- VeraCrypt: veracrypt.fr
- Tor: torproject.org
- GnuPG: gnupg.org
Education:
- EFF Surveillance Self-Defense: ssd.eff.org
- Security Education Companion: sec-edu.github.io
- CryptPad (encrypted docs): cryptpad.fr
Communities:
- Riseup.net (radical tech collective)
- May First (movement tech)
- Local hacklabs and anarchist tech spaces
Remember: The tool is not the practice. Encryption works when people work together, verify each other, maintain discipline, and build security culture. Technical knowledge without operational security is false confidence.
Encrypt. Verify. Compartmentalize. Trust comrades, verify identity, and build the secure networks that outlast the surveillance state.
The math is on our side. The practice is up to us.