No trace, no case. A collection of tools to help anarchists and other rebels understand the capabilities of their enemies, undermine surveillance efforts, and ultimately act without getting caught. Visit at notrace.how.
0 Posts
1 Comment
Joined 6 months ago
Cake day: May 21st, 2024
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
Hi! We’re the No Trace Project (you can verify this by sending us an email, address is in our website’s footer). Reposting here the comment we’ve made on privacyguides’ cross-post (hopefully this is good etiquette, we’re not used to Lemmy). Regarding the quality of the information we provide, we wanted to clarify that different sections of our website are subject to different editorial processes. In particular, our Resources are by design a collection of things written by many different people with sometimes differing viewpoints on security issues; while we do check their overall accuracy, we don’t necessarily fully vouch for their contents. Our Threat Library, on the other hand, is written by us and we strive to make it comprehensive and accurate — with the caveat that we often have to exercise editorial judgment when evaluating sources used for case studies as we don’t have the means to fully verify their authenticity. We are in the process of writing an editorial policy to clarify all of this. Feel free to contact us here or by email if needed.
Hi! We’re the No Trace Project (you can verify this by sending us an email, address is in our website’s footer). Reposting here the comment we’ve made on privacyguides’ cross-post (hopefully this is good etiquette, we’re not used to Lemmy). Regarding the quality of the information we provide, we wanted to clarify that different sections of our website are subject to different editorial processes. In particular, our Resources are by design a collection of things written by many different people with sometimes differing viewpoints on security issues; while we do check their overall accuracy, we don’t necessarily fully vouch for their contents. Our Threat Library, on the other hand, is written by us and we strive to make it comprehensive and accurate — with the caveat that we often have to exercise editorial judgment when evaluating sources used for case studies as we don’t have the means to fully verify their authenticity. We are in the process of writing an editorial policy to clarify all of this. Feel free to contact us here or by email if needed.