SKIP TO CONTENT

GOODTROUBLE_

INFORM. ORGANIZE. RESIST.

Resources and strategies for digital privacy, community organizing, and collective action against fascism and oppression.

RESISTING FASCISM IN AMERICA

As authoritarianism and fascist movements rise in America, our democratic institutions face unprecedented threats. We must organize, educate, and build community resistance to protect our rights and freedoms.

“The vote is the most powerful nonviolent tool we have.” — John Lewis

5 THINGS TO DO RIGHT NOW

Don't know where to start? These five steps will immediately improve your security and connect you to resistance networks. Each takes under 15 minutes.

01

Install Signal and move your organizing chats off SMS and social media

Download Signal — it's free, end-to-end encrypted, and takes 2 minutes to set up. Enable disappearing messages for sensitive conversations. This single step protects more activists than any other tool.

02

Set up a password manager and enable two-factor authentication

Install Bitwarden (free, open-source). Generate unique passwords for every account. Then enable 2FA on your email, social media, and banking — use an authenticator app, not SMS.

03

Lock down your social media privacy settings

Review who can see your posts, your friends list, and your location. Turn off location tagging on photos. Remove your phone number from public profiles. Platform-specific lockdown guide →

04

Know your rights if stopped by police or ICE

You have the right to remain silent. You don't have to consent to a search. You can record police in public. Write the NLG legal hotline number on your arm before any action. Full rights guide →

05

Connect with a local organizing group

Individual action matters, but collective action wins. Search for local groups through Indivisible, Mutual Aid Hub, or Mobilize. Or start your own — here's how.

ESSENTIAL RESOURCES

Digital Privacy

Encrypted messaging, browser hardening, VPN setup, metadata removal, and device security — organized by threat level so you know exactly what to prioritize.

Access Guides

Safe Communication

Signal setup, secure email, operational security for group chats, and protocols for organizing when you assume you're being monitored.

Connect Safely

Protecting Rights

Know your rights at protests, during police encounters, and if detained by ICE. Legal support contacts, bail fund networks, and documentation guides.

Learn More

NAVIGATE::YOUR_PATH

Don't know where to start? Our guided paths help you navigate the wealth of resistance resources based on your needs and experience level.

001101100011001000010
0110100000
1111110110010110111
0110001111
0011011011
10011101010111001100
1101100001
0100111000100000010101011100
10000101001110011
0111001110000110000111000
110100011101001001100011010
0101100001100010011011
0100000010100110011111
100111101111000
01101000111011011000
0001011000111010110
10100000011100100000000
10101100111010001011
011001100000000
1000100000101
00000110101
10000110101011111
10100101000001
01001100011000101110000
1010001010100110010111
011101000111100
11010011110010
011111111110111100100010
1111000111101
111101100110110011

RESISTANCE ALERTS_

CURRENT THREATS // TIME-SENSITIVE ACTION // COMMUNITY DEFENSE

URGENT

[01] URGENT: Surveillance State Expansion

New legislation aims to expand facial recognition in public spaces and remove warrant requirements for digital searches.

TAKE ACTION NOW

[02] Digital Rights Rally: October 15

Join us for a nationwide protest against censorship and data harvesting by tech giants.

Join Event
URGENT

[03] ALERT: Voting Rights Under Attack

New voter suppression tactics include digital disinformation campaigns and gerrymandering.

Defend Democracy

[04] Secure Comms Workshop

Learn to set up encrypted messaging, VPNs, and Tor for secure communications.

Register
			11011110101110000110000011100111001011100100010101
			10010111101011011001100011001010000011011111011011
			<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-blue)]">const</span> encrypt = require("crypto");<span class="text-[var(--tech-cyan)]">function</span> secure() {<span class="text-[var(--tech-cyan)]">function</span> secure() {
			  return encrypt(data);  const key = generateKey(2048);  const key = generateKey(2048);  return encrypt(data);  const key = generateKey(2048);  const key = generateKey(2048);  const key = generateKey(2048);  return encrypt(data);  const key = generateKey(2048);  const key = generateKey(2048);  const key = generateKey(2048);  const key = generateKey(2048);  return encrypt(data);  return encrypt(data);  const key = generateKey(2048);  return encrypt(data);  const key = generateKey(2048);  return encrypt(data);  const key = generateKey(2048);  return encrypt(data);  return encrypt(data);  return encrypt(data);  const key = generateKey(2048);  return encrypt(data);  const key = generateKey(2048);  return encrypt(data);  const key = generateKey(2048);  return encrypt(data);  return encrypt(data);  return encrypt(data);  const key = generateKey(2048);  return encrypt(data);  const key = generateKey(2048);  const key = generateKey(2048);  return encrypt(data);  return encrypt(data);  return encrypt(data);  return encrypt(data);  const key = generateKey(2048);  const key = generateKey(2048);  return encrypt(data);  return encrypt(data);  return encrypt(data);  const key = generateKey(2048);  const key = generateKey(2048);  const key = generateKey(2048);  const key = generateKey(2048);  return encrypt(data);  return encrypt(data);  const key = generateKey(2048);
			  return hash(input);}}  return hash(input);  return hash(input);  return hash(input);  return hash(input);}}  return hash(input);}  return hash(input);  return hash(input);}  return hash(input);  return hash(input);}  return hash(input);}  return hash(input);}  return hash(input);}  return hash(input);  return hash(input);}  return hash(input);  return hash(input);  return hash(input);}  return hash(input);}}  return hash(input);}  return hash(input);}  return hash(input);}  return hash(input);}}  return hash(input);}}}  return hash(input);  return hash(input);}  return hash(input);
			01011111110111110110011110011000111110110101000111
		

TAKE ACTION

Online Resources

Access privacy tools, guides for secure communications, and resources to protect yourself and your community online.

  • Browser hardening, VPN guides, encrypted storage
  • Signal, ProtonMail, and secure group communications
  • Data deletion, metadata stripping, account cleanup
Access Resources

Community Action

Connect with local groups organizing for justice, democracy, and human rights through grassroots networks.

  • Start or join a mutual aid network in your area
  • Know your rights at protests and during police encounters
  • Campaign planning, power mapping, and direct action
Get Involved

GET CONNECTED

Join our network of activists, community organizers, and privacy advocates working to build digital resistance against fascism and protect our collective future.

// Together we make good trouble, necessary trouble.
DRAG

RESISTANCE WIRE _