HOW TO RESIST SAFELY
The Authority controls through fear, surveillance, and information suppression. This guide provides practical methods for resisting safely, protecting yourself and others, and spreading truth without getting killed.
Security Fundamentals
1. Accessing This Site Safely
If you're in a protected zone:
- Use Tor Browser: Anonymous browsing, Authority can't track your access
- Use VPN: Encrypt your internet traffic, hide your location
- Public WiFi: Don't access from home connection - use public networks, coffee shops, libraries
- Clear Browser History: After each session, clear everything - history, cookies, cache
- Don't Bookmark: Don't save this URL in bookmarks - memorize it or write it down offline
Never access this site from:
- Authority networks or computers
- Your home internet without VPN/Tor
- Work computers (unless you work in private sector with no Authority connections)
- Public computers that log usage
2. Communication Security
Assume all electronic communication is monitored.
Safe Communication Methods (in order of security):
- In-Person (Most Secure): Face-to-face in public place with no surveillance. No phones nearby (turn off, leave at home).
- Dead Drops: Physical locations for leaving/receiving information. No direct contact between parties.
- Encrypted Messaging: Signal, PGP-encrypted email. Better than plain text, but still potentially compromised.
- Code Words: If you must use monitored channels, develop code words/phrases. Assume Authority will eventually crack codes.
NEVER discuss sensitive information via:
- Regular phone calls
- Text messages
- Unencrypted email
- Social media
- Any Authority-controlled communication system
3. Operational Security (OpSec)
Need-to-Know Basis: Don't tell anyone anything they don't need to know. The less people know, the less they can reveal (willingly or under pressure).
Compartmentalization: Keep different activities separate. Don't connect your real identity to resistance work.
Cover Story: Have plausible explanations for your activities. "I was at the library" is better than "I can't tell you."
Trust Slowly: Authority uses informants. Be cautious about who you trust with what information.
Information Resistance
Spreading Truth Safely
Physical Methods (Harder to Trace):
- Printed Materials: Print documents from public computers, distribute by hand
- Graffiti: Simple messages in public spaces (use gloves, no cameras nearby)
- Word of Mouth: Conversations in private, no electronic record
- Anonymous Notes: Leave printed information in public places (libraries, restrooms, bulletin boards)
Digital Methods (More Risk, Wider Reach):
- Anonymous Accounts: Create social media/forum accounts with fake information, use VPN/Tor
- File Sharing: Distribute documents via encrypted file sharing services
- Website Mirrors: Copy this site's content, host on different servers
- Email Lists: Encrypted mass distribution of information
Key Principles:
- Don't get caught. Dead resisters can't spread truth.
- Small actions matter. One person reading this site is one more person who knows the truth.
- Persistence over drama. Quiet, consistent information spreading is better than dramatic one-time actions.
Spotting Authority Propaganda
Red Flags in Official Narratives:
- Over-justification: Excessive explanation of why something is "for your safety" usually means it's not
- Emotional manipulation: Fear-based messaging ("protect your family," "prevent tragedy")
- Vague threats: "Security concerns" without specific details
- Historical revision: Claims about "The Collapse" that don't match survivor testimony
- Statistics without context: "99.2% accuracy" without defining what that means
- Dehumanization: Referring to people as "unauthorized," "threats," "fraudulent"
Questions To Ask:
- Who benefits from this policy?
- What information is conspicuously absent?
- Do the numbers add up?
- What are they NOT saying?
- Why do they need to convince us so hard?
Protecting Whistleblowers & Sources
If You Work For The Authority:
You have access to evidence that could expose crimes. Here's how to leak it safely:
- Document Everything: Photos, copies, screenshots - but do it carefully (no phones, use secure devices)
- Don't Use Work Systems: Don't email from work, don't save to work computers, don't access resistance sites from Authority networks
- Remove Identifying Information: Scrub metadata, avoid handwriting, use generic language in communications
- Use Dead Drops: Physical locations for leaving materials, no direct contact
- Contact Anonymously: Encrypted email from public computer with VPN/Tor, or anonymous notes with instructions
- Don't Tell Anyone: Not friends, not family, not coworkers. Every person who knows is a potential leak.
- Have Exit Plan: If you're caught, you may need to disappear. Plan ahead.
Contact Methods: Secure contact information →
If You're Helping Whistleblowers:
- Protect Identity: Never reveal sources without explicit permission
- Verify Carefully: Confirm authenticity without compromising source
- Secure Storage: Encrypted files, secure backups, multiple locations
- Be Prepared: Authority may come for you. Have contingency plans.
What NOT To Do
Actions That Get People Killed:
- Armed Resistance: Authority has military assets. You will lose. They'll use your violence to justify crackdowns.
- Sabotage: Destroying Authority property gives them excuse to label you terrorist, justify harsh measures.
- Confronting Inspectors: Won't change anything, will get you denied/arrested/killed.
- Public Protests: In protected zones, Authority controls everything. Protests get you arrested or disappeared.
- Trusting Too Quickly: Authority uses informants. Verify trust over time.
- Keeping Evidence At Home: First place they'll search. Use dead drops, encrypted cloud storage, multiple backups.
- Using Real Name Online: Don't connect resistance work to your real identity unless you're willing to be arrested.
Long-Term Resistance
This Is Marathon, Not Sprint
The Authority has been in power for 25 years. They won't fall tomorrow. Effective resistance requires patience, persistence, and sustainability.
Sustainable Resistance:
- Stay Alive: Dead resisters can't resist. Safety first.
- Stay Free: Arrested resisters can't resist. Don't get caught.
- Stay Sane: Burnout helps the Authority. Take breaks, maintain mental health.
- Build Networks: Slowly, carefully, with trusted people.
- Preserve Evidence: Document crimes, protect witnesses, maintain archives.
- Spread Information: Every person who learns the truth is progress.
- Support Others: Mutual aid, shared resources, collective strength.
For Different Situations
If You're in Protected Zones:
- Use secure communication methods
- Spread information carefully
- Support denied travelers when safe
- Document Authority abuses
- Build networks of trusted people
If You're Denied Checkpoint Crossing:
- Document everything (denial reasons, inspector name/ID, date/time)
- File formal appeal (slow but sometimes works)
- Contact resistance networks for support
- Don't attempt unauthorized crossing without preparation
- Consider Belt settlement options (research thoroughly first)
If You're in Belt Settlements:
- Maintain settlement security (location secrecy)
- Share survival knowledge with other settlements
- Document that you exist (proof Belt is habitable)
- Support refugees fleeing Authority zones
- Preserve true history for children
If You Work For The Authority:
- Document abuses, wrongful denials, corruption
- Leak information safely (see whistleblower section)
- Help travelers when you can without getting caught
- Question orders that seem unjust
- Plan your exit if you want to leave
I've been resisting for 14 years. I'm still alive. I'm still free. I'm still fighting.
That's not luck. It's operational security, careful planning, and accepting that this is a long game.
Some days I want to do something dramatic. Storm a checkpoint. Confront Isabella Jean. Make them pay NOW.
But that would get me killed. And then I couldn't maintain this site, couldn't collect testimony, couldn't preserve evidence.
The best resistance is staying alive, staying free, and spreading truth. One person at a time. One document at a time. One testimony at a time.
It's slow. It's frustrating. But it works. You're reading this. That's proof.
Stay safe. Stay smart. Keep resisting.
— Elena Vasquez, 10/29/2057
Resources
- Tor Browser: Anonymous web browsing - download before you need it
- VPN Services: Encrypt internet traffic - research trusted providers
- Encrypted Messaging: Signal (most secure widely-available option)
- PGP Encryption: For email - learn before you need it
- This Site: Bookmark URL offline, memorize if possible
Practice OpSec BEFORE you need it. Don't wait until you're in danger to learn security basics.