Crypt pad is realtime Collaborative docs simplar to google docs. Due to its secure nature it laks an easy way to group documents, requiring the need to create and manage an inventory of the secure URLs. You can also use a desktop text or document editor and share by encrypted channel (not realtime)
Document Collaboration
- Crypt pad
- Proton apps
- Etherpad service hosted by Riseup
Last updated: September 3rd, 2024
Document Collaboration by actionskills.co is licensed under a Creative Commons Attribution 4.0 International License.
https://actionskills.au/resource/document-collaboration/.
- Ten quick and easy things to radically improve your digital privacy and security
- Please Note
- Webinar discussing this content and tools
- Why Secure myself? – I am not doing anything worth spying on
- Why Bother, they can access all my data anyway?
- Who are we protecting from?
- Herd Immunity – My part in protecting everyone
- Don’t let Paranoia stop you organising
- Convenience VS Security
- Be geek street-smart – Security is not perfect
- Digital literacy – learn your technology
- Encryption works – What is encryption?
- Encrypt all devices, drives and sensitive folders
- Multiple backups
- Update your software regular – apply updates
- Lock your computer and phones. Review security settings
- Phone security
- Secure Phone communications
- Smart password mangement
- Antivirus and scanners
- Location and tracking
- MFA – Multi-factor authentication
- Private Internet – Stop using Google and FaceBook (so much)
- Private Internet – Block ads and trackers
- Private Internet – VPN – Virtual private network
- Private Internet – Tor – Anonymous Browsing
- Private Internet – Anonymous Connection
- Private internet – commerce
- Advanced anonymous internet
- Security Culture – working in groups
- Remote Group collaboration – working online
- Document Collaboration
- Secure Email
- Group Chat
- Video conferencing
- Phones and laptops in meetings
- Databases and CRMs
- Email list management
- Secure PC Operating System
- More digital security guides