The Research Center for Proxy Politics aims to explore and reflect upon the nature of medial networks and their actors, that is, machines and things as well as humans. The proxy, a decoy or surrogate, is today often used to designate a computer server acting as an intermediary for requests from clients. Originating in the Latin procurator, an agent representing others in a court of law, proxies are now emblematic of a post-representational political age, one increasingly populated by bot militias, puppet states, ghostwriters, and communication relays. During the period of the project (September 2014 to August 2017) the center will host a series of workshops at the Universität der Künste, Berlin, revolving around a wide range of relevant topics including the politics of digital networks, the political economy of crypto-currencies, the genealogy of networked thought, the mediality of physical landscapes and strategies of opacity. The center will also conduct material, experimental, investigations into the conception and construction of alternative networks, or alternets.

(TEXT) 14/02 2017

Practical Security and Privacy Guidelines

Mick Halsband, Boaz Levin

      Security vs Innocence


The main concern with data security is to balance between having your devices seem innocent and having your devices be secure.

Security can sometimes be incriminating.

For these reasons we have separate recommendations for day-to-day (safe & anonymous) usage; and extreme security scenarios (safest but not innocent).

Try to find a balance which makes sense with your individual concerns and threats on the one hand; and with your individual work habits and resources on the other.

Lastly, it is better to have average security all the time, than perfect security once in a blue moon.


     Best everyday practices for some security and anonymization


Activate a VPN

Open an anonymous browser window (private (firefox) or incognito (chrome))

Use anonymous search engines (,


     Best practices for high-security scenarios


Activate TOR browser

Follow these guidelines


     Security setup


Secure your browser

Use encrypted online storage

Use secure signal messenger

Use a secure email account

Use a different secure password for each service with a password manager
PC/Mac, Android, iPhone

Device encryption
PC/Mac, iPhone, Android


     For further reading


Berlin based non-profit tactical-tech comprised a list of tools and best practices

A very comprehensive guide overview