Security Tools

Secure Messaging for Activists: Because "Nothing to Hide" Stops Being True When the Government Disagrees

In 2019, Hong Kong protesters used AirDrop to coordinate because their messaging apps were monitored. In 2020, Black Lives Matter organizers discovered that law enforcement had been tracking them through social media and cell tower data for months. I

adhen prasetiyo
adhen prasetiyo
Digital illustration representing secure messaging activists
Digital illustration representing secure messaging activists

Secure Messaging for Activists: Because "Nothing to Hide" Stops Being True When the Government Disagrees

In 2019, Hong Kong protesters used AirDrop to coordinate because their messaging apps were monitored. In 2020, Black Lives Matter organizers discovered that law enforcement had been tracking them through social media and cell tower data for months. In 2022, Iranian women organizing against compulsory hijab laws found that their Telegram groups had been infiltrated by state security agents. In 2024, environmental activists in multiple countries learned that authorities had used their Signal metadata — not the messages themselves, but who talked to whom and when — to map protest networks.

Secure messaging is not a luxury for people who live in safe democracies and have nothing controversial to say. Secure messaging is a survival tool for anyone whose speech, association, or beliefs could put them at risk — from authoritarian governments, from corporate retaliation, from targeted harassment campaigns, or from legal systems that treat peaceful organization as criminal activity.

This article is not another comparison of Signal versus WhatsApp. You can read that elsewhere on this site. This is about the operational thinking behind secure communication — the decisions that determine whether your messages protect you or become evidence against you.

Threat Modeling: Before You Choose a Tool, Understand Your Enemy

The most common mistake activists make with digital security is adopting tools without first understanding their specific threats. A journalist protecting a source has different needs than a labor organizer building a union in a hostile workplace. A human rights worker in a country with pervasive surveillance faces different risks than a climate activist in a Western democracy planning a permitted march.

Threat modeling starts with four questions.

What are you protecting? The content of your messages, the identities of your contacts, your physical location during events, your organizational structure, or all of the above?

Who is the adversary? A nation-state intelligence service with the ability to intercept telecommunications infrastructure, a local police department with access to cell tower data, a corporate security team with access to company networks, or internet trolls with doxing capabilities?

What capabilities does the adversary have? Can they compel service providers to hand over data through legal process? Can they install surveillance software on your device through physical access or remote exploitation? Can they monitor network traffic at the infrastructure level? Can they infiltrate your group through informants?

What are the consequences of failure? Social embarrassment, job loss, arrest, physical violence, imprisonment, or worse?

Your answers to these questions determine which tools and practices actually protect you, rather than just giving you a false sense of security.

End-to-End Encryption Is Table Stakes, Not the Finish Line

End-to-end encryption means that only the sender and receiver can read the message content. The messaging service itself cannot read it. This is crucial and non-negotiable. But encryption alone does not protect you from the most common threats activists face.

Your device is the weakest link. End-to-end encryption protects messages in transit and at rest on servers. It does not protect messages stored on your phone. If your device is seized, unlocked, or compromised with spyware, every message on it is readable regardless of encryption.

Metadata tells the story. Who you talk to, when, how often, and from where is metadata. In many surveillance contexts, metadata is more valuable than message content. Knowing that a journalist spoke with three people inside a government ministry for an hour the night before a leak story publishes tells investigators almost everything they need, even if they never read a word of the conversation.

Group membership is exposure. Joining an encrypted group chat with 200 other activists creates a list of 200 people who are associated with that activity. If one member's device is compromised, the entire member list is exposed, along with historical messages depending on the platform.

Screenshots defeat encryption. Any participant in a conversation can take screenshots, photograph their screen, or use a separate device to record what is displayed. Encryption protects against external interception, not against participants who turn hostile or are coerced.

Signal: What It Does and Does Not Protect

Signal is the gold standard for encrypted messaging among security researchers, journalists, and activists. Its protocol is open source, independently audited, and used as the encryption layer in WhatsApp and Google Messages as well. Signal collects minimal metadata — registration date and last connection time are essentially all the company stores.

Here is what Signal protects well: message content in transit and on Signal's servers. Sender identity from network observers (though not from the recipient). Message content from Signal the company, which stores virtually nothing.

Here is what Signal does not protect: messages on a seized device (unless disappearing messages were enabled and the timer has expired). The fact that you use Signal (your ISP can see you connect to Signal's servers). Your phone number, which is required for registration and linked to your identity unless you used a burner number. Group membership lists stored on member devices. Read receipts and typing indicators (which can be disabled but are on by default).

For activists facing serious threats, using Signal is necessary but not sufficient. The following practices transform Signal from a messaging app into a security tool.

Enable disappearing messages by default. Set them to the shortest practical duration — 24 hours or less for sensitive conversations. Messages that do not exist cannot be seized, subpoenaed, or screenshotted weeks later.

Use registration lock. This prevents someone from re-registering your phone number on Signal, which would give them access to your group memberships and contact list.

Disable link previews. When Signal generates a preview for a URL you share, your device reaches out to that website, potentially revealing your IP address to the site operator.

Use a registration number not linked to your identity. In some countries, prepaid SIM cards can be purchased without identification. A phone number used only for Signal and not linked to your real name provides an additional layer of separation.

Beyond Signal: When You Need More

For activists facing state-level surveillance, additional tools and practices may be necessary.

Briar is a messaging app designed specifically for high-risk environments. It can operate without internet infrastructure, using Bluetooth or Wi-Fi mesh networking to pass messages between nearby devices. During internet shutdowns — common during protests in authoritarian countries — Briar continues to function. Messages are stored only on participant devices, with no servers involved at all.

Session removes the phone number requirement entirely. It uses an onion routing network similar to Tor to obscure metadata. No phone number, no email address, and no personally identifiable information is needed to create an account. The tradeoff is a smaller user base and slower message delivery due to the onion routing overhead.

Cwtch is an experimental decentralized messaging platform built on Tor that provides metadata-resistant communication. It is still relatively new and has a small user base, but its architecture addresses metadata concerns that even Signal does not fully solve.

For document sharing and collaborative work, OnionShare allows file transfers over Tor without any third-party service. Files are served directly from your device through an onion address, meaning no copy exists on any server at any point.

Metadata: The Data About Your Data

A common misconception is that encrypted messaging protects your privacy comprehensively. It does not, because metadata exists outside the encryption envelope.

Consider what metadata reveals even when message content is unreadable:

Your phone number contacted these 47 other phone numbers over the past month. Sixteen of those numbers were in the same group chat. Messages were sent at elevated frequency on three specific dates that correspond to protest events. Several of those numbers were at the same cell tower location during those events. After each protest, one number contacted three others within ten minutes, suggesting a reporting structure.

This analysis requires zero access to message content. Cell tower records, connection logs, and traffic analysis provide it all. Governments in multiple countries have used exactly this kind of analysis to identify protest organizers, map organizational hierarchies, and build cases for prosecution.

Protecting metadata requires more aggressive measures than simply choosing an encrypted messenger. Using a VPN or Tor masks your IP address from the messaging service but not from your internet provider, which can see you connecting to a VPN. Using the messaging app over Wi-Fi rather than cellular data avoids generating cell tower location records tied to your phone number. Using a dedicated device for activist communication separates that metadata from your daily personal metadata.

Device Seizure: Preparing for the Worst

In many protest contexts, device seizure is a realistic scenario. Police confiscate phones during arrests. Border agents search devices at checkpoints. Authorities execute search warrants on homes and offices.

Preparing for device seizure is not about hiding illegal activity. It is about protecting your contacts, your organizational information, and your constitutionally protected speech from being used to build association maps, chill legitimate expression, or target your community.

Full-device encryption is the baseline. Both iOS and Android encrypt device storage when a passcode is set. Use a six-digit PIN at minimum, and ideally an alphanumeric password for situations where seizure risk is elevated. Biometric unlock (fingerprint, face recognition) is convenient but legally vulnerable — courts in several jurisdictions have ruled that authorities can compel you to provide a fingerprint but not a passcode.

Before attending a protest or crossing a border, consider leaving your primary phone at home and bringing a secondary device with only the apps and contacts needed for that specific situation. This limits what can be accessed if the device is seized.

Remote wipe capability should be configured on your device. Both iOS (Find My iPhone) and Android (Find My Device) support remote erasure. If your device is seized and you still have access to another device, you can wipe it remotely before forensic extraction is performed.

Know your rights. In the United States, the Fifth Amendment protects against compelled disclosure of passcodes in most circuits, though this law is still evolving. In other countries, refusing to provide a device password can itself be a criminal offense. Know the legal framework in your jurisdiction before you face the situation.

Operational Security: The Human Layer

Technology is only as strong as the practices around it. The most common security failures among activist groups are human, not technical.

Compartmentalize information. Not everyone in an organization needs to know everything. Sensitive information should be shared on a need-to-know basis. If only three people know the specific details of an action plan, compromising one person's device exposes only what those three discussed.

Vet new members carefully. Infiltration by informants, provocateurs, or hostile actors is a documented tactic used by law enforcement and private intelligence firms against activist organizations worldwide. Sensitive channels should not be open-invitation.

Establish communication protocols. Agree on which platform is used for what type of communication. Logistics on Signal with disappearing messages. Public announcements through social media. Sensitive planning in person, with devices left in another room. Clear protocols reduce the chance that someone accidentally discusses sensitive information on an inappropriate channel.

Regularly audit group memberships. Remove inactive members. Remove people who have left the organization. Every person in a group chat is a potential point of compromise.

Practice the hard conversations. What happens if a member is arrested? Who does what? What information is at risk? Having a plan for security incidents is just as important as having a plan for the events themselves.

The Balance Between Security and Usability

Perfect security is unusable, and perfectly usable security is inadequate. The practical challenge for activists is finding the balance point that provides meaningful protection without making communication so difficult that people abandon it.

A security practice that 80% of your group follows consistently protects better than a practice that 30% follow perfectly and 70% ignore. Choose tools that are accessible to your least technical members. Provide training, not just tool recommendations. Check in regularly about whether people are actually using the agreed-upon practices.

The goal is not to make surveillance impossible. Against a sufficiently resourced and motivated adversary, that may not be achievable. The goal is to make surveillance expensive, difficult, and risky enough that it cannot be done passively, broadly, or cheaply. Force the adversary to commit significant resources and take legal risks to target your specific group. That calculus changes what is politically and practically feasible.

Your right to communicate securely is not just a technical question. It is a human rights question. And it deserves serious, thoughtful answers.

Enjoyed this article?

Share it with your network

Copied!
adhen prasetiyo

Written by

adhen prasetiyo

Research Bug bounty Profesional, freelance at HackerOne, Intigriti, and Bugcrowd.