Optimal security for Ambazonian activists and fighters

FREE AMBAZONIA
FREE AMBAZONIA
DIGITAL
ⓈⒺⒸⓊⓇⒾⓉⓎ
OUR VALIANT GENERALS NEED THIS STUFF
Jamer fit make he hide di place he di call or use data from. Some sort of camouflaging...

Some necessary measures
Password protect phones, computers, tablets and any usable device that can be password protected.

A seized phone is thus encrypted and difficult to exploit. Difficult, not impossible.
If it's a simple phone, the difficulty multiplies. However, IOS and ANDROID phones are somewhat vulnerable in forensics. The data can be extracted and exploited.
When dey seize phone, dem di go inside, read all your messages and call log. Dem di gather enough info for use am agaisnt US. That's why the GZ activists and fighters MUST password protect and crypt the contents of their devices.
The computer password protection offers 2 possibilities. The admin and the normal user. Chose the Admin option to enable HD encrypting if your bios offers that possibility. Do not keep documents on the HD. Always use an external USB media. This is for the activists at GZ.

Is localization activated on the phone ?
Yes. It means, if lost it can easily be traced and localized.
No. It means, if your phone is lost, it cannot be traced or localized.
The problem na sé if you want to camouflage, na problem.
THE USE OF IMAGES AND VIDEOS BY THE FIGHTERS
"We are at WAR. We do need some intelligentsia. We do need a communication platform for certain messages. Never use android, Symbian, ios, windows, blackberry tyzen, Linux, mi or any phone which uses an operating system to communicate on GZ. please do use only simple phones. It is easier to trace a phone with an operating system as if offers many possibilities for the tracker. The Internet Protocol is quickly obtained and traced. The GPS also gives a possible and quick insight of your position.The pictures you take give a clear view of the environment which can easily be traced with an image matching in a database. Please, the FIGHTERS, ONLY MAKE USE OF SIMPLE PHONES when communicating with each other. You'll also need a communication code which you should ask before answering to certain calls. These are issues that need to be fixed immediately."

Concerning the Activist movements, it would be (security needs) nice to use a different platform other than Facebook as it's completely monitored and lags at times(mass connection), account suspension and son on. However, it should be a must to use a specific platform.

Telegram (Good comm platform for the activists and fighters a MUST if you use an OS phone)

In short, the activists should have a separate communication platform where they can exchange ideas, optimize and update their thinking on actions.

We can notice that groups eliminated are mostly those exposed in videos.
In order to avoid tracing, a phone should be put off. Only putting it on within a range of time makes tracing a little bit difficult.
Whatever, as soon as you get into the internet, you are traced and all you see and all you write is traced. One should be very careful in this particular situation.

The use of people's names on the show is good and bad. Good, as it encourages others to do same and promotes clarity and transparency. On the other hand, the bad minds can use these names for blackmailing. La République can record those names for a probable usage against them and families.

I hear say la republique don by material den, use am jam communications ? Na serious lie. The image and video options which lead the actors of the video is perfectly right as the only possible option with China is with the phones. Yes, Chinese phones have spywares in them, they can collect the contents with ease. That is another problem. No be jamming my dear brothers and sisters. Na ip tracing and visual betrayal combined with inner conflicting don always lead to killings.
FREE AMBAZONIA
FREE AMBAZONIA
FREE AMBAZONIA
FREE AMBAZONIA
ANOTHER VERY IMPORTANT THING NA PASSWORD PROTECTING ALL FILES

Make use of winrar when sending files. Archive files with password option.
If PDF, WORD, EXCEL, POWERPOINT, ACCESS, LATEX, also password protect it.

PLEASE ALWAYS ARCHIVE FILES. AND USE PASSWORDS
Make use of  LINUX (Redhat,Ubuntu.....)

 A Research Branch focused on Different Web activities. 
The use of specific software for different branches of defense, studies and analysis.
The use of DarkNet. Application Cracking and Data penetration on local and remote systems.
Deep web Spidering and mass Data storage. Archiving to Local and external Servers.

There are many methods to tighten security.
Completely restructure the DIGITAL DEPARTMENT (comm, media, archiving  and son on)
OPTIMAL SECURITY IS VERY IMPORTANT 
FREE AMBAZONIA

Comments

Popular posts from this blog

Ambazonia, the path to freedom

ALL the FORCES Defending AMBAZONIA for TOTAL FREEDOM.

Ambazonia Analysis