from @MidnightMan

If you have been wondering what you can do make a meaningful difference, then I may have an answer for you. Urgent action is required to prepare the people of the United States for a fascist government to come into power, and by extension the increasingly likely prospect of a genocide, but I can’t do it alone.

If you are a knowledge addict, data miner, proficient writer, or an otherwise gifted individual, then this may be your calling. We’re going to be doing and learning a lot of cool stuff, but the work is tedious, and it will aid you immensely to be driven either out of passion for learning and personal growth, love of labor, or sheer love for your fellow compatriots. Several self-maintained application servers are being run to assist with operations and collaboration.

If you’re curious or want to learn more, you can contact me at [email protected] with a new email for increased compartmentaliation, after which you will receive a reply from my primary email. Our activities are strictly legal, but anonymity on your part is strongly encouraged as a precaution to retaliatory action. Interested parties should not respond to this message over Lemmy.

#####################################################################################

The above message is likely an attempt to collect email addresses of people who might be well meaning. I would strongly advise against communicating with this person for the below reasons.

You cannot encrypt email End to End. It has to be stored in plaintext somewhere.

Yahoo does not offer encrypted email.

You have no idea of who will be emailing you back so there will be no way in which to validate your comms.

If you’re looking to organize you can follow the advice below

For those interested in building networks and organizing folks to get together that’s even better. However it carries some risk so if you’re organizing use E2E comms and if you’re researching use Tor Browser. Better yet use a Tails USB on a coffee shop wifi.

https://www.tomsguide.com/how-to/how-to-use-signal

https://www.torproject.org/download/

https://tails.net/doc/first_steps/index.en.html

And don’t communicate over email, even encrypted email. Email needs to be stored and archived for it to work, often in plaintext so it’s never going to be a secure way to communicate.

For a place to start looking for aid and assistance. If there’s a fridge or book or tool share that’s not there, notify them please so they can update the site.

https://mutualaidhub.org/

If you’re looking for a place to help, look up Food Not Bombs plus whatever city is closest to you.

http://foodnotbombs.net/new_site/volunteer.php

I understand it’s an http site. Don’t sign up for anything that doesn’t pass your vibe check.

If you’d like to help undo all these info purges there’s

https://wiki.archiveteam.org/index.php/ArchiveTeam_Warrior

Most of all, talk to loved ones, build community. We keep us safe. If you’re interested you could start a patrol and disrupt ICE stakeouts.

https://www.immigrantdefenseproject.org/raids/

It’s a marathon not a sprint. Sometimes it’s as easy as doing the dishes. Mutual aid helps your neighbors and helps you.

https://afsc.org/news/how-create-mutual-aid-network

Self care and avoiding burnout is most important. They want us harried and worried and feeling like there’s nothing we can do. Fuck that

  • CrayonRosary@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    21 hours ago

    Did you even read that article? It has nothing to do with what I said. I pointed out that you don’t understand how public key encryption works, and you replied with an article about an exploit that does not refute what I said. An exploit that does An exploit that can be avoided by simply not clicking “load images”. An exploit that has probably been fixed in a client like Thunderbird anytime over the past six years. An exploit that has nothing to do with revealing your private key.

    I don’t know why I’m wasting my time with you. You can’t even argue in good faith.

      • CrayonRosary@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        20 hours ago

        How about you address my actual reply instead of changing the topic constantly?

        The PGP public key still has to be shared plaintext… that makes it useless as anyone can sign it after that.

        That sentence is incorrect. Just admit it.

        an unsolicited message from someone you don’t know, asking you to email them could be suspect.

        How is that any different from a matrix chat or unsolicited signal chat or literally any other communications platform? You were saying that specifically PGP was somehow fundamentally bad when it’s actually better than most other communication platforms, because the private key is private, and messages are signed with that private key, and cannot be spoofed by a third party. You can’t know who you’re actually talking to (just like every other chat platform!) but you at least know every future message is from that same person.

        • horse_battery_staple@lemmy.worldOP
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          20 hours ago

          I’ve admitted that was wrong about PGP in other posts in this thread.

          The unsolicited nature of the initial communication is what I’m concerned with.

          I’m learning a lot about PGP in this thread but my initial point still stands. Unsolicited invitation to an unencrypted email is a problem for me and my security hygiene.