Post B0EC3ITByGOtzDmUnw by tomjennings@tldr.nettime.org
 (DIR) More posts by tomjennings@tldr.nettime.org
 (DIR) Post #B0EB299J2XGkppMplo by Mikal@sfba.social
       2025-11-14T04:25:41Z
       
       0 likes, 0 repeats
       
       I am involved with or adjacent to several activist groups working on border and immigrant rights issues who use Google forms and Gmail accounts for organizing, volunteer signups and so on. At this point, I see a Google form as an ICE form. Can anyone change my mind here? How is asking potential new members to fill out a Google form not a massive opsec fail? Am I overreacting? I would love to be wrong.https://www.404media.co/google-has-chosen-a-side-in-trumps-mass-deportation-effort/
       
 (DIR) Post #B0EB2Ajr886FlTTXNY by tomjennings@tldr.nettime.org
       2025-11-14T06:22:36Z
       
       0 likes, 0 repeats
       
       @MikalIt is insane to use Google docs for anything remotely like that.
       
 (DIR) Post #B0EB2EMxdCA91cnJFQ by Mikal@sfba.social
       2025-11-14T05:01:15Z
       
       0 likes, 0 repeats
       
       Can some #infosec person or expert in Why-Google-Is-Evil-And-You-Shouldn't-Give-Them-Your-Data-Especially-If-You're-An-Activist explain it to me like I am five so that I can provide a clear argument to these groups? I'm feeling like they see me the same way as if I were talking about chemtrails or 5G conspiracies. Whatever the case, I'm not getting through to people.
       
 (DIR) Post #B0EBExDghiYTbLWXpo by dlakelan@mastodon.sdf.org
       2025-11-14T05:07:09Z
       
       0 likes, 0 repeats
       
       @MikalYou are 100% right. All of it is subpoena-able at the very least. If they aren't literally already subpoenaing them to just search everything with certain phrases or whatever.
       
 (DIR) Post #B0EBEyIKhvrgw2hliK by Mikal@sfba.social
       2025-11-14T05:15:15Z
       
       0 likes, 0 repeats
       
       @dlakelan Sure, anything is subject to subpoena, but the question is also whether they would cooperate (certainly) and also whether they would just hand it over upon request (probably). Or, worse, give ICE their own set of keys to the server closet, as it were.
       
 (DIR) Post #B0EBEzRaR0rSV22fmC by tomjennings@tldr.nettime.org
       2025-11-14T06:24:54Z
       
       0 likes, 0 repeats
       
       @MikalBut it's easier to subpoena stuff you know exists and where it exists and probably who's using it. This is just physics.  @dlakelan
       
 (DIR) Post #B0EC3ITByGOtzDmUnw by tomjennings@tldr.nettime.org
       2025-11-14T06:34:02Z
       
       0 likes, 0 repeats
       
       @MikalIn 2025? Trusting any (any) traded corporations services for life and death, especially when it is against the interests of the current administration, is incredibly naive and foolish.  Never mind intent, not one of them has not had breaches. And individual participants are extremely unlikely to be super opsec attendant (I mean duh if they're using Docs and think it's safe). It's likely this should not be done using networked computers at all.  At all. I think that statement is unthinkable to many people today.  I think all of those people are  dead wrong.  Even signal is hardly infallible. And we know to use that effectively requires skill and intent. And one fuck up ruins it.   @dlakelan