Encrypted Chatrooms & VoIP Applications

Encrypted chatrooms and VoIP services, such as like WhatsApp and Telegram, are not only great for business communications, but they critically important for human rights defenders and political activists fighting around the world – especially in at risk or oppressive countries. It is important to understand that even if you are living in a country which has banned Tor, VPN’s or applications such as Telegram, and you are afraid to use/install those programs out of fear of persecution, encrypted chatrooms can be equally as easy to use and remain 100% legal to boot.

For example, even in countries like Egypt, Iran, Pakistan – et cetera – which have either outright or periodically banned VoIP services such as Telegram and Viber, other chatroom-based services like Chatbox or Slack are still free and legal to own, and can be used to protect private communications all the same. In fact, political activists in countries such as Ethiopia and Egypt are known to have used encrypted chat services to safely coordinate communications, rallies and protests in times of great civil unrest, such as during the Oromo protests and Rabba Massacre. I know this because I was there on the front-lines helping to set up their accounts.

It’s usually free to sign up for these services, and all you need is a verified email address or phone number to login. Then, once enrolled, you can encrypt your chatroom by setting up a custom name/URL for it and requiring password authentication for entry. This assures that only the people you give the URL address to will be able to find it, and only those who know the password to it will be able to enter. Additionally, once set up, you can even set up individual channels within the chatroom itself for a duel level of security/encryption. This includes setting custom rules for different channels, such as requiring Administrator approval for access. This assures that if even someone is able to brute-force their way into your chatroom itself, there are still protocols in place to protect individual communications and information within the chatroom itself.

Additionally, especially if you are doing activism or human rights work, or feel that your life/security could be in danger for the work you do, it is always recommended to never use your real life identity or personal email accounts to set up an encrypted chatroom or channel. Instead, you should always create an online alias and use it to register a new account within an encrypted email service provider, such as ProtonMail or Tutanota. Obviously, this advice need not apply for those of you who are using these services for business purposes. Lastly, some chatroom services actually offer built in video chats, allowing for a third means to make secure voice connections outside of standard phone calls or VoIP services.

For more information on how to keep a safe, private and Anonymous identity online, please read the following tutorial: https://anonhq.com/anonymous-security-guide-2-0/

For more information on different encrypted email service providers and how you can make the switch, please read the following link: https://roguemedia.co/2019/11/02/making-the-switch-to-encrypted-emails-2/

Best/Top Chatroom Service Providers:

Voice Over Internet Protocol (VoIP):

While VoIP services are not necessarily essential for everyday phone use, they do offer critical protections for political activists, journalists, researchers and citizens living under oppressive regimes all around the world. VoIP stands for Voice over Internet Protocol, which is just a fancy way of saying they transport all calls and messages over established internet connections, rather than routing them through your telecommunications or phone service provider – such as AT&T or Verizon.

In areas like the United States and European Union, VoIP services are important to own because they prevent your data from being intercepted, recorded or stolen by telecommunications companies and other interested 3rd parties, such as Governments, thus protecting any information you send across the wires. VoIP services also offer the ability to encrypt messages or calls between like users, further protecting customer privacy. By comparison, both of these options are unavailable on standard text messages or phone calls straight from your phone provider. In politically oppressive countries around the world, VoIP services are even more important because they offer a critical means to bypass Government imposed restrictions or blockades on national telecommunications on a local level, while also allowing users to make international calls entirely for free.

While this might sound a bit complex or advanced, once installed, operating a VoIP connection/application is no more different or complicated than making a regular phone call or sending traditional text messages. Instead of using your normal texts messages or phone App, you simply download a VoIP App and log into that to make/receive calls and texts – it’s literally that easy. Lastly, VoIP connections offer a secondary means to reach your contacts, should your phone lose service, go out of cell tower range or come under blackout. Rather than relying on the signal strength of your network service provider of choice, all you need is an active internet connection to utilize a VoIP services.

The Best/Top VoIP Service Providers:

 

Join Rogue Media Labs New Online Chatroom

Earlier this year I managed to create a fairly large and successful online chatroom through the Discord service, but abruptly closed its doors for reasons I can not entirely understand/explain myself. Regardless, now that I have changed my website and begun writing again, I figure now is the perfect time to re-launch that platform and begin inviting everyone in once again.

Please note that it will take some time to build again and put all of the proper resources together, which might take a little longer now that I work full time offline. This includes stuff like security tutorials, nerd resources and weaponry, things like this. None the less, it will get there and I invite anyone interested to join in and watch/participate as we continue to build. If you don’t have Discord for your phone or PC yet, you should install this first, then click on the link. But you will still be able to join in the chat with your browser too, by clicking on the link below – though it will be as temporary as long as your browser window stays open, which is why I recommend to download first.

Chat Invitation – Click To Join: https://discord.gg/b3hmKYU

Connecting The Online Hacking World – The Ultimate Anonymous Handbook

I’m not sure if it’s a result of all the protests and riots around France, or the political fallout following the perceived failures/letdowns of international conservatives elected throughout the course of 2015 and 2016, or its the new treasure troves of hacks and leaks coming out of Brasil and Europe, but it certainly feels as though more and more people around the world are starting to become interested in hacking, Anonymous and online activism in general. In that spirit, a group of hackers known as LulzSecITA is leading the charge for #OpPaperStorm to close out the year 2018, explaining to the world that:

“You do not have to be a HACKER if you want CHANGE. Important events do not just occur on the internet. The revolution of consciousness is already taking place all around the world, and now is a unique time in history to make all of our voices count! You can participate too. In fact, you MUST participate. There is the global battle taking place online and in our streets to conquer your minds, freedom and to hide you from the truth. Our goal is to get our voices in the ears of all politicians in all rooms of Parliament, Ministry’s and Government Agencies worldwide. Collectively, we use our right to free speech in the war against corruption and equality. Join us!

Politicians do not represent you, the media deceives and lies to you while distorting the truth, and your government censors critical information at the heart of many important issues. What you must realize is that you are the media, you are the truth. In out modern time, the internet and social media is a tool which allows any and all of us to be our own reporter, so go and make the news! Create your own accounts, tell your stories and share truth with the world. Collectively we CAN change the world.

In spirit of their message and overall goal, I too would like to add to the discussion and resources. For those of you whom may be unfamiliar with the movement, here is a little information to help teach and get you started down the path towards becoming an online activist or part of the Anonymous movement. First off, while it might be a little cliche, anyone whom has ever “joined” Anonymous or thought about doing so has indubitably come across the following video:

All The Tools Necessary To Find or Become Anonymous:

AnonOps IRC | Home To AntiSec & LulzSec:

https://anonops.com
https://webchat.anonops.com
https://newblood.anonops.com/

CyberGuerrilla IRC | Home To The Undergrounds Best:

https://www.cyberguerrilla.org/
https://irc.cyberguerrilla.org (ClearNet)
https://aldfqlbwtsagq2gy.onion (Tor)
https://webchat.cyberguerrilla.org (WebChat)

Other Places To Look:

4Chan Random Board: https://boards.4chan.org/b/
Reddit Anonymous Board: https://www.reddit.com/r/anonymous/
Reddit WTF Board: https://www.reddit.com/r/WTF/

Security Resources:

VPN’s: https://newblood.anonops.com/vpn.html
The Onion Network: https://newblood.anonops.com/tor.html
Security Handbook: https://newblood.anonops.com/security.html
Email Encryption Basics: https://newblood.anonops.com/securemail.html
Connecting To The IRC: https://newblood.anonops.com/basics.html
HexChat IRC On Windows or Linux: https://newblood.anonops.com/hexchat.html
How To Write Un-Hackable Passwords: https://roguesecrutiylabs.ltd/how-to-write-un-hackable-passwords
Phone Security: https://roguesecuritylabs.ltd/phone-security
Email Security Strategies: https://roguesecuritylabs.ltd/email-security-strategies
Making The Switch To Encrypted Emails: https://roguesecuritylabs.ltd/making-the-switch-to-encrypted-emails/
Securing Your Social Media Accounts: https://roguesecuritylabs.ltd/securing-social-media-accounts
Building & Selecting Safer Web Browsers: https://roguesecuritylabs.ltd/building-selecting-safer-web-browsers
The Value of Copy & Paste Services: https://roguesecuritylabs.ltd/copy-paste-services
Data Servers, Country of Origin & Cyber Security: https://roguesecuritylabs.ltd/misconceptions-nationalism-and-security/
Encrypted Chatrooms & VoIP Apps: https://roguesecuritylabs.ltd/encrypted-chatrooms-voip-apps
Internet Router Security: https://roguesecuritylabs.ltd/internet-router-security
Miscellaneous Tips, Tricks & Security ‘Hacks’: https://roguesecuritylabs.ltd/miscellaneous-tips-tricks-security-hacks
Anonymous Security Guide 2.0: https://anonhq.com/anonymous-security-guide-2-0/
Operation Security: https://iamanonymous.com/dont-be-burnt-toast-unknown-guide-to-operation-security/

Operating Systems:

Alternative Hacker OS: https://ghostbin.com/paste/79ht8
Kali Linux: https://www.kali.org/downloads/
ParrotSec OS: https://www.parrotsec.org/download.php
BlackArch OS: https://blackarch.org/downloads.html
Tails OS: https://tails.boum.org/install/
Installing Duel OS’s Through Virtual Machines: https://www.vmware.com/pdf/dualboot_tech_note.pdf

Linux Commands Encyclopedia: https://ss64.com/bash/
Windows cmd Encyclopedia: https://ss64.com/nt/
macOS Commands Encyclopedia: https://ss64.com/osx/

Pirates Guide To Anonymous:

** Note: Some, but not all links/downloads have been taken down by authorities **

Leak 1 | EC-Council’s Certified Ethical Hacker (CEH) Course: 

Reconnaissance/Footprinting: http://www.mediafire.com/download/5tex1gndiis0rz3/Reconnaissance+-+Footprinting.rar
SQL Injection: http://www.mediafire.com/download/1bap7hf82clm9dy/SQL+Injection.rar
Scanning Networks: http://www.mediafire.com/download/22t74lyof149u41/Scanning+networks.rar
Enumeration: http://www.mediafire.com/download/h285291nt7w8trh/Enumeration.rar
Hacking Web Servers: http://www.mediafire.com/download/g4di658xb9stz8g/Pentesting+Web+Servers.rar
Hacking Web Applications: http://www.mediafire.com/download/waqslt6jhk6ph1a/Pentesting+Web+Applications.rar
Cryptography: http://www.mediafire.com/download/1cujirp51m911k8/Cryptography.rar
Sniffing: http://www.mediafire.com/download/fzbq3zzzqspzw15/Sniffing.rar
Session Hijacking: http://www.mediafire.com/download/5irzrhub4r6mva3/Session+Hijacking.rar
Social Engineering: http://www.mediafire.com/download/2xqgt9g7044n683/Social+Engineering.rar
System Hacking: http://www.mediafire.com/download/zf2d20969azd887/System+hacking.rar
Denial of Service: http://www.mediafire.com/download/x5zxdvv1h3k54nk/Denial+of+Service.rar
Hacking Wireless Networks: http://www.mediafire.com/download/r9hrz8zotis74f1/Hacking+wireless+networks.rar
Malware Threats: http://www.mediafire.com/download/8caooodccdnc608/Malware+threats.rar
Evading IDS, Firewalls, and Honeypots: http://www.mediafire.com/download/33z5epburhu1xgy/Evading+IDS%2C+Firewalls%2C+and+Honeypots.rar
Hacking Mobile Platforms: http://www.mediafire.com/download/l45v3ne52qr9llw/Mobile+platforms.rar

Leak 2 | More Hacking Courses:

Introduction to Pentesting and Ethical Hacking with Kali Linux: http://www.mediafire.com/download/492h7o887yxexha/PT+and+EH+with+Kali+Linux.rar
Introduction to Firewalls: http://www.mediafire.com/download/2kczrn29gt6fdp3/Introduction+to+Firewalls.rar
Introduction to Browser Security Headers: http://www.mediafire.com/download/t98r47bpo9hy5n1/Introduction+to+browser+security+headers.rar
Introduction to Wireshark: http://www.mediafire.com/download/ou45m7o4xqt1qdu/Introduction+to+Wireshark.rar
Troubleshooting with Wireshark: http://www.mediafire.com/download/n5exc1bomahud9m/Troubleshooting+with+Wireshark+Fundamental+Protocol+Analysis.rar
Wireshark 2.0: http://www.mediafire.com/download/n98viipaz131fhq/Wireshark+2.0.rar
Network Security Testing with Nmap: http://www.mediafire.com/download/3guhkfrhfbvs01b/NMAP.rar
All about buffer Overflows: http://www.mediafire.com/download/sbst1evvisywe62/Buffer+Overflow.rar
Network Pentesting using Python and Kali Linux: http://www.mediafire.com/download/7rq1ujn9424d3hb/Network+PT+Using+Python+and+K_4li+Linux.rar
Metasploit Basics: http://www.mediafire.com/download/mnulcdbw817f9q0/Metasploit+Basics.rar
CloudFlare Security: http://www.mediafire.com/download/qchaazzxrdsmwja/CloudFlare+Security.rar
Hack your API First: http://www.mediafire.com/download/1qqm5pcj6pz37wn/Hack+your+API+First.rar
Risk Identification, Monitoring, and Analysis: http://www.mediafire.com/download/roaeau041zx8byx/SSCP%3B+Risk+Identification%2C+Monitoring%2C+and+Analysis.rar
Check Point Certified Security Administrator; Install & Deploy: http://www.mediafire.com/download/ysvx972ymd57gme/Check+Point+Certified+Security+Administrator%3B+Install+%26+Deploy.rar
Cloud Security: http://www.mediafire.com/download/ka9qu9136x8on4j/Cloud+security.rar
Cloud Computing: http://www.mediafire.com/download/6ctvkguxr9g4609/Cloud+computing.rar
Introduction to Pentesting using Metasploit: http://www.mediafire.com/download/5ut59in0l6okeaq/Introduction+to+Penetration+Testing+Using+Metasploit.rar

Leak 3 | Coursera Training Courses:

Software Security: http://www.mediafire.com/download/mvk782rt6k28yha/Software+Security.rar
Hardware Security: http://www.mediafire.com/download/vxd0998dmniuccz/Hardware+Security.rar
Bitcoin & Cryptocurrency Tech: http://www.mediafire.com/download/mehi7uxazp5f6g6/Bitcoin+and+Cryptocurrency+Technologies+[Princeton+University].7z

Leak 4 | Programming:

C++ Fundamentals: http://www.mediafire.com/download/su02297mbmlxq27/C%2B%2B+Fundamentals.rar
C++ Advanced Topics: http://www.mediafire.com/download/9tgfpx8pzwakrjc/C%2B%2B_Advanced_Topics.rar
C Fundamentals: http://www.mediafire.com/download/com5mg5fda6mwd6/C+Fundamentals.rar
C In Action: http://www.mediafire.com/download/dzr3d2jymdhdqs6/C+in+Action.rar
Java Fundamentals: http://www.mediafire.com/download/t5rygwbb45izg71/Java+Fundamentals.rar
Java from Scratch: http://www.mediafire.com/download/rr8kjao0zaxld3o/JavaScript+from+Scratch.rar
Introduction to Java: http://www.mediafire.com/download/fd9r8hc6u6zouga/SitePoint-Introduction.to.JavaScript.7z
Introductions to HTML: http://www.mediafire.com/download/w37r7339ouih7lg/Introduction+to+HTML+for+Designers.rar
Introduction To JQuery: http://www.mediafire.com/download/0j09qr98vtbdjab/Introduction+to+jQuery+for+Designers.rar
Introduction To CSS: http://www.mediafire.com/download/jj466s79n75ns46/Introduction+to+CSS+for+Designers.rar
Introduction To Arduino: http://www.mediafire.com/download/pvmstcc4abura43/Arduino.rar
Getting Started with AngularJS: http://www.mediafire.com/download/sbrgwwksehmz8rc/Angular_Js_-_Get_Started.rar
Building Angular & Node JS Apps: http://www.mediafire.com/download/e5ynwz4th5g3bvo/Building+Angular+and+Node.js+Apps+with+the+MEAN+Stack.rar
ExtJS Desktop Fundamentals: http://www.mediafire.com/download/ooulsej4ui421q6/ExtJS+Desktop+Fundamentals.rar
Python Fundamentals: http://www.mediafire.com/download/gsc0epd3jvgayfb/Python+Fundamentals.rar
Python, Beyong The Basics: http://www.mediafire.com/download/dbn6i84zfsb8566/Python_%E2%80%93_Beyond_the_Basics.rar
An Introduction To Concurrent Python: https://hackaday.com/2018/12/18/thread-carefully-an-introduction-to-concurrent-python/
Ruby 2.0: http://www.mediafire.com/download/p9oappfwmb5mdvb/SitePoint-Ruby2.7z
Getting Started with BackBone JS: http://www.mediafire.com/download/9anvrv6dxaaacbn/SitePoint-Getting.Started.with.BackBone.js.7z
Introduction To Powershell: http://www.mediafire.com/download/8b63ljih3cjl426/PowerShell_
Raspberry Pi Home Server: http://www.mediafire.com/download/sl36dmuomdld4qa/RaspberryPi+HomeServer.rar
Raspberry Pi for Developers: http://www.mediafire.com/download/5u2g1svecr1iukm/Raspberry+for+Devs.rar

Leak 5 | Cisco CCNA Security:

Introduction To Network Security: http://www.mediafire.com/download/yraijpmuzoa1zpn/Cisco+CCNA+Security%3B+Introduction+to+Network+Security.rar
AAA & IP Security: http://www.mediafire.com/download/lmj3ri990ou3j64/Cisco_CCNA_Security%3B_AAA_and_IP_Security.rar
Firewalls & VPN’s: http://www.mediafire.com/download/lhajdkufn9oi5ta/Cisco+CCNA+Security%3B+Firewalls+and+VPNs.rar

Leak 6 | # CompTIA A+:

Computer Hardware: http://www.mediafire.com/download/f5013b98tc40fj8/CompTIA+A%2B+Part+1%3B+Computer+Hardware.rar
Networking: http://www.mediafire.com/download/38q520p66a5a68q/CompTIA+A%2B+Part+2%3B+Networking.rar
Peripherals & Best Practices: http://www.mediafire.com/download/psmkodtkcy440rz/CompTIA+A%2B+Part+3%3B+Peripherals+and+best+practices.rar
Operating Systems: http://www.mediafire.com/download/mi3mvleyyd8ayu4/CompTIA+A%2B+Part+4%3B+Operating+Systems.rar
Mobile Devices & Troubleshooting: http://www.mediafire.com/download/5scd91h4gkaefoa/CompTIA+A%2B+Part+5%3B+Mobile+Devices+and+Troubleshooting.rar

Leak 7 | CompTIA Security+:

Network & Domain Security: http://www.mediafire.com/download/wbdho927tnl1p26/CompTIA+Security%2B.rar
Network Architecture: http://www.mediafire.com/download/2j9vbybrqab3x5q/Network+Architecture+for+CompTIA+Network%2B.rar
Network Operations: http://www.mediafire.com/download/y65xsb8n6rfdcp8/Network+Operations+for+CompTIA+Network%2B.rar
Network Security 2: http://www.mediafire.com/download/d4qdr3jwh337033/Network+Security+for+CompTIA+Network%2B.rar

Leak 8 | Linux:

Linux Installation and Initial Configuration: http://www.mediafire.com/download/xxz33o4tq1obpzk/Linux+Installation+and+Initial+Configuration.rar
Introduction to the Bash Shell: http://www.mediafire.com/download/i24oogco4ch9ma4/Introduction+to+the+Bash+Shell.rar
Shell Scripting with Bash: http://www.mediafire.com/download/t5eha9cr4eckayb/Shell+Scripting+with+Bash.rar
Linux Command Line Interface Fundamentals: http://www.mediafire.com/download/27hfeldyqrs2ae8/Linux+Command+Line+Interface+%28CLI%29+Fundamentals.rar

Leak 9 | Video Editing:

Adobe Premiere Pro CC Fundamentals: http://www.mediafire.com/download/6pn0jr7nlb7rmc0/Adobe+Premiere+Pro+CC+Fundamentals.rar
Animation and Video Editing in Photoshop: http://www.mediafire.com/download/ys44ptebw6tk4o8/Animation+and+Video+Editing+in+Photoshop+CS6.rar
Color Correction and Grading in Adobe Premiere Pro and SpeedGrade: http://www.mediafire.com/download/evuudd9t6dtc3ej/Color+Correction+and+Grading+in+Adobe+Premiere+Pro+and+SpeedGrade.rar
Action Scene Editing Techniques in Adobe Premiere Pro: http://www.mediafire.com/download/0gu7x007mpaclwd/Action+Scene+Editing+Techniques+in+Adobe+Premiere+Pro.rar
Adobe Premiere Pro CS6 Setup (Software Itself, Not A Course): http://www.mediafire.com/download/u6dko8ug5ysbrw2/Adobe+Premiere+Pro+CS6.rar

Leak 10 | Miscellaneous:

Clean Code: http://www.mediafire.com/download/6ny3ybv2ojzr6vt/Clean+Code.rar
Test Driven Development with Brad Wilson: http://www.mediafire.com/download/cc6ibqxbhdcivea/TDD+with+Brad+Wilson.rar
The Fundamentals of Scrum Methodology: http://www.mediafire.com/download/cp8w28mcl1258o4/ScrumFundamentals.rar
Building A Successful Blog: http://www.mediafire.com/download/0u690ecz1q8lj1k/1.+Building+a+successful+blog.rar
Building A High Traffic Profitable Blog: http://www.mediafire.com/download/653jtq5261zuapx/2.+Building+a+High+Traffic%2C+Profitable+Blog.rar
Fiddler: http://www.mediafire.com/download/xvgjnq2ispauz3v/Fiddler.rar

Leak 11 | Other Resources:

Hacking PDF’s Extracted from repository.root-me.org: http://www.mediafire.com/download/0i9b46gjcqzr2jc/root-me-docs.rar
Alternative Cloud Services: http://github.com/juandecarrion/awesome-self-hosted

Accounts To Follow:

@CgAn_Doemela | @JTSEC3313 | @LulzSec_ITA | @4n0nGh05t | @LulzSeguridad | @nonymousNews | @ArgGhostHackers |@Scode404 | @Shad0wS3C ‏‏| @LorianSynaro ‏| @__s1ege ‏| @GhostSquadHack | @NamaTikure ‏| @urharmful | @LabDefCon ‏| @SH4RPSH0OTER ‏| @NewWorldHacker ‏| @Mecz1nho ‏| @ergo_hacker ‏| @M1r0x__ ‏| @Knushh ‏| @zglobal_ ‏| @La9deAnon | @Lil_Sh4wtyy ‏| @YourAnonArg ‏| @yellowvestanons ‏| @AnonyResistance ‏| @AnonFrance ‏| @AnonsCouncil ‏| @campuscodi

Best Sources for Hacking News:

Rogue Media Labs: https://roguemedia.co/category/hacking-news/
Softpedia: https://news.softpedia.com/
SC Media: https://www.scmagazine.com/home/security-news/
Bleeping Computer: https://www.bleepingcomputer.com/
ZDNET: https://www.zdnet.com/
Security Affairs: https://securityaffairs.co/wordpress/
The Hacker News: https://thehackernews.com/
HackRead: https://www.hackread.com/
InfoSec Magazine: https://www.infosecurity-magazine.com/

Latest Human Rights News Worldwide:

Human Rights Watch: https://www.hrw.org/
Amnesty International: https://www.amnesty.org/en/latest/news/

As LulzSecITA closes out their press release, once you get the hang of the online stuff you should next take to the streets – #OpPaperStorm:

1. Be creative, serious and maybe even a little ironic, use direct messages. Express your opinions and criticisms against the state. You must want change.

2. Organize, prepare, photocopy leaflets, banners, posters, stickers, indelible markers or color cans, or simply download the existing images and print them! With a few euros you can create masterpieces. Be your own artist and express yourself in a way only you can.

3. Distribute flyers, hang your banners, paste your posters with adhesive tape, spray with the can on the walls to create real street-art, put images on the bulletin boards around the city. Create a team and join forces with other. Talk to as many people as possible about ANONYMOUS, about corrupt politics and about poverty or whatever you are passionate about!

4. Document what you create! Capture your art with a photo in order to get as many people as possible your message!

5. Work at night or whenever there are few people! Pay attention to the cameras and the police, leave no traces except your art! Activism is not a crime! But unfortunately in recent times you have to be very careful!

ATTENTION: All work is good for Anonymous, there is no fixed ideology of Anonymous, but carefully use our logos, emblems, existing images, posters / banners, the V mask (Guy Fawkes) or our well-known slogan!

Create with us,
Be Anonymous,
Be a street warrior!

We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Wait for us!

OpPaperStorm Press Release 2018: https://pastebin.com/t7wMgwPu

Encrypted Chatrooms & VoIP Applications

Encrypted chatrooms and VoIP services, such as like WhatsApp and Telegram, are not only great for business communications, but they critically important for human rights defenders and political activists fighting around the world – especially in at risk or oppressive countries. It is important to understand that even if you are living in a country which has banned Tor, VPN’s or applications such as Telegram, and you are afraid to use/install those programs out of fear of persecution, encrypted chatrooms can be equally as easy to use and remain 100% legal to boot.

For example, even in countries like Egypt, Iran, Pakistan – et cetera – which have either outright or periodically banned VoIP services such as Telegram and Viber, other chatroom-based services like Chatbox or Slack are still free and legal to own, and can be used to protect private communications all the same. In fact, political activists in countries such as Ethiopia and Egypt are known to have used encrypted chat services to safely coordinate communications, rallies and protests in times of great civil unrest, such as during the Oromo protests and Rabba Massacre. I know this because I was there on the front-lines helping to set up their accounts.

It’s usually free to sign up for these services, and all you need is a verified email address or phone number to login. Then, once enrolled, you can encrypt your chatroom by setting up a custom name/URL for it and requiring password authentication for entry. This assures that only the people you give the URL address to will be able to find it, and only those who know the password to it will be able to enter. Additionally, once set up, you can even set up individual channels within the chatroom itself for a duel level of security/encryption. This includes setting custom rules for different channels, such as requiring Administrator approval for access. This assures that if even someone is able to brute-force their way into your chatroom itself, there are still protocols in place to protect individual communications and information within the chatroom itself.

Additionally, especially if you are doing activism or human rights work, or feel that your life/security could be in danger for the work you do, it is always recommended to never use your real life identity or personal email accounts to set up an encrypted chatroom or channel. Instead, you should always create an online alias and use it to register a new account within an encrypted email service provider, such as ProtonMail or Tutanota. Obviously, this advice need not apply for those of you who are using these services for business purposes. Lastly, some chatroom services actually offer built in video chats, allowing for a third means to make secure voice connections outside of standard phone calls or VoIP services.

For more information on how to keep a safe, private and Anonymous identity online, please read the following tutorial: https://anonhq.com/anonymous-security-guide-2-0/

For more information on different encrypted email service providers and how you can make the switch, please read the following link: https://roguesecuritylabs.ltd/making-the-switch-to-encrypted-emails/

Best/Top Chatroom Service Providers:

Voice Over Internet Protocol (VoIP):

While VoIP services are not necessarily essential for everyday phone use, they do offer critical protections for political activists, journalists, researchers and citizens living under oppressive regimes all around the world. VoIP stands for Voice over Internet Protocol, which is just a fancy way of saying they transport all calls and messages over established internet connections, rather than routing them through your telecommunications or phone service provider – such as AT&T or Verizon.

In areas like the United States and European Union, VoIP services are important to own because they prevent your data from being intercepted, recorded or stolen by telecommunications companies and other interested 3rd parties, such as Governments, thus protecting any information you send across the wires. VoIP services also offer the ability to encrypt messages or calls between like users, further protecting customer privacy. By comparison, both of these options are unavailable on standard text messages or phone calls straight from your phone provider. In politically oppressive countries around the world, VoIP services are even more important because they offer a critical means to bypass Government imposed restrictions or blockades on national telecommunications on a local level, while also allowing users to make international calls entirely for free.

While this might sound a bit complex or advanced, once installed, operating a VoIP connection/application is no more different or complicated than making a regular phone call or sending traditional text messages. Instead of using your normal texts messages or phone App, you simply download a VoIP App and log into that to make/receive calls and texts – it’s literally that easy. Lastly, VoIP connections offer a secondary means to reach your contacts, should your phone lose service, go out of cell tower range or come under blackout. Rather than relying on the signal strength of your network service provider of choice, all you need is an active internet connection to utilize a VoIP services.

The Best/Top VoIP Service Providers: