Resources

Resources

Sister chapters, primary research, and an operational kit. Use what fits your context. Treat each tool as a default, not an endorsement.

Movement and research

Coalition

Research

Solidarity

Tools for safer organizing

Defaults the chapter uses for sensitive work. None of these are silver bullets; threat models matter more than products.

Email

Documents

  • CryptPadcryptpad.org

    End-to-end encrypted alternative to common office suites. Documents, spreadsheets, kanban; share by URL.

Files

  • OnionShareonionshare.org

    Open-source file sharing over Tor. The URL is unguessable; the recipient downloads directly from your machine while you're online.

Communication

  • Signalsignal.org

    End-to-end encrypted messaging and calls with forward secrecy and post-compromise security. The standard for sensitive coordination.

Devices

  • GrapheneOSgrapheneos.org

    Hardened, privacy-focused Android-compatible OS. Useful when your phone is part of your threat model: removes Google services and mitigates several common surveillance vectors. Pixel hardware required.

VPNs

Eric Hughes, 1993

A Cypherpunk's Manifesto

Back to home