Tech Tools for Activism

Securing your email

What you can learn from this chapter:

  • differences between independent versus commercial email providers
  • how to sign up for an activist email account and mailing lists
  • how to encrypt your email.

Why use independent email?

Email is decentralised and therefore can be very secure. However, many people use less secure forms of communication such as commerical webmail providers (Google, Hotmail, Hushmail etc.) and social networking sites. Be aware that these companies will:

  • log your usage and hand over all your data to the authorities on demand
  • reserve the right to terminate your account as they see fit.

Happily, there are alternatives. Independent email services are run by media activist collectives such as or, who understand the need for privacy, anonymity and trust. Unlike corporate providers, they will not give your emails to the authorities without a warrant and a legal fight. If that happens, they will make it public if they can, so you (and thousands of other activists) will know about it.

Independent email providers provide a web interface over an encrypted connection, and encrypt all messages sent between themselves; an email from an aktivix user to a riseup user is encrypted both as it's composed and when it travels between aktivix and riseup. 

Sign up for independent email

Signing up for an independent email address is not an immediate automated process, because of spammers. For example, issues email addresses though a friend-of-a-friend basis. If you know someone with an email address, you can fill in a the sign up form at  

Alternatively, you can sign up for an account at or You will need to fill in a short form letting them know why you want the email and they normally respond in 24 hours.

Why use independent email lists?

A dedicated mailing list can handle large email lists which you can’t manage manually. People can subscribe to or unsubscribe from the list and the server handles security, privacy and archiving; members of the list don’t automatically know the email addresses of all the other members. Lists provided by activist collectives are only as good as their weakest point: if just one address is "", you can’t consider the list to be secure.

If your list is small enough to manage manually, remember to use the BCC (blind carbon copy) field for their addresses rather than the To or CC fields. This keeps every recipient's address private.

Set up an email list

Collectives that provide mailing list services include the following:,, We recommend Email to request a list; stating your request simply in the subject line (e.g. "Subject: request for list for XYZ group/purpose") makes it easier to separate from sp@m. Not all names are possible, so be prepared to change. Think about the following points when creating a list:

  • open or closed: can anyone subscribe or do subscriptions need to be approved?
  • public or private: is the list to be advertised to the world, or is it run on a need-to-know basis?
  • announce or discussion: is the list for receiving information only or for discussing something?
  • moderated or not: are posts to the list to be moderated?

Encrypting your email

If you are concerned about privacy but not using a secure webmail service, are communicating with someone who is not, or want an addition of level of personal security, you can encrypt your email.

Encryption is the process of taking a plain text message and converting into something that looks like gobbledygook, which can be decrypted and read by the intended recipient. The free software tool of choice for this is called GPG (GNU Privacy Guard). Many people find GPG tricky, so be prepared that it may take time - but it is worth it.

GPG encryption uses pairs of numbers called key pairs: a public key and a private one. You give your public key to anyone you wish to have encrypted communication with, but keep your private key absolutely secret, as it is used to decrypt email sent to you. It is so secret that it needs protecting with a passphrase, which is basically a very long password. 

By encrypting email using the recipients' public keys, the sender can be assured that only the authorised recipients will be able to read it - privacy.  If the email is signed by the sender's GPG key, the recipient can be assured of the identity of the sender - authenticity

Step-by-step instructions to set up and use GPG with the Thunderbird email client can be found in the book Basic Internet Security and there is an online course which TTFA run at; you can even earn a badge.

What Next?

  • Try to set up an email account with, or similar.
  • Encourage your contacts to set up secure Email accounts.
  • Try using GPG encryption.