Blogs

Malwares and backdoors: the Free Software approach

Data and communications must be protected from backdoors and viruses that could compromise them. Viruses introduce themselves into computer systems and may destroy or exploit the data they contain. Backdoors are deliberately inserted by the designers of a software application for the purpose of gaining access to the machines running the application. Both viruses and backdoors allow the people who control them to do things like extract confidential information. The risk is real: in July 2020, the company Orange confirmed they were targeted by a malware that leaked data belonging to its business customers.

Continue reading

Get rid of intermediaries resisting encryption

Back when our lives were not dominated by digital communications, eavesdropping on someone was expensive because it required people to do it. Letters had to be opened and copied. Microphones and tape recorders had to be discretely installed to record conversations. In the past twenty years things have changed, however: the number of intermediaries we use to communicate with one another has exploded, and surveillance is now automated. Not a year goes by without headlines in the news reminding us how much the State or corporations take advantage of these technological developments (and related changes in society) to exploit the private data of citizens, human rights defenders, and journalists.

Continue reading

Privacy

Who is we? In the context of a horizontal community, the word we has a different meaning than within not-for-profit organizations or companies. We are the individuals who have access to the resources that would enable them to modify how it is implemented. For instance, someone with access to the configuration of the web server can change the log retention policy. What information do we collect? We collect information from you when you register on our site and gather data when you participate in the community by reading, writing, and evaluating the content shared here.

Continue reading

If you want privacy, run your own videoconferencing service

With remote working being more popular than ever and the need to organize activities on the net, our communications are increasingly going through videoconferencing services. Some of these services are criticized for how they use our personal data, but surveillance from law enforcement agencies is also cause for concern. Entrusting your data to a free service will always mean that you must believe the service provider’s assurances with regard to privacy.

Continue reading

Legalese

Copyright The copyright of the software and content used to build the infrastructure is held by the individual contributors who implemented it, as found in the git history. Intellectual Property Did You Say “Intellectual Property”? It’s a Seductive Mirage Disclaimer of Warranty There is no warranty for the service, to the extent permitted by applicable law. Except when otherwise stated in writing the service is provided “as is” without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose.

Continue reading

An effective Code of Conduct

Expectations A Code of Conduct applies to people who interact in a well defined space, either online or IRL. For instance, the forum is an online space where you, as a first time participant, expects that other people present behave according to the Code of Conduct. If you think somone else is working against the Code of Conduct, you also expect help from people who claim to be members of the Enough Community.

Continue reading

What is Enough?

Enough is a platform for journalists, sources and human rights defenders to communicate privately and securely. It starts as a service providing the same functions and level of security as an online storage provider (such as DropBox, Google Drive etc.). And it can be progressively upgraded with more sophisticated measures, starting with 2FA up to an airgap machine dedicated to decrypting classified documents. Most of Enough users are journailists or human rights defenders who don’t require the highest-level security option provided by systems like SecureDrop.

Continue reading

Enough Community Code of Conduct

The Enough Community members strive to: Be friendly, patient and welcoming. We strive to be a community that welcomes and supports people of all backgrounds and identities. This includes, but is not limited to, members of any race, ethnicity, culture, national origin, colour, immigration status, social and economic class, educational level, sex, sexual orientation, gender identity and expression, age, size, family status, political belief, religion and mental and physical ability.

Continue reading

Enough Community Manifesto

Enough is a community of individuals helping journalists, sources and human right defenders communicate privately and securely. It has no hierarchy: anyone can do what they want as long as they respect others. Differences, divergences and disagreements are encouraged: they are a source of diversity and creativity. Although most of the work is focused on finding innovative methods and create original software, it also is necessary to spend significant time listening to others and improve how we communicate: this is what fuels a friendly community where everyone can feel safe and appreciated.

Continue reading