Skip to main content
⚡ LIMITED TIME

FOUNDER OFFER - Pay for 1 Year → Get 3 Years

of Zero-Knowledge Cloud Encryption

Founder Badge & RecognitionPriority Support & Early Access3x Value - Best Deal Ever

Resist Surveillance,
Protect Your Movement

Digital tools for activists facing surveillance, censorship, and coercion.
Your data stays yours.

Duress Mode Time Bomb Zero-Knowledge

Understanding Your Unique Risk Profile

The threats activists face require specialized protection

🕵️

State Surveillance

Authoritarian governments monitoring activists, tracking communications, identifying organizers.

Traditional Cloud Exposure:

  • Government can access cloud data
  • Force providers to hand over files
  • Identify movement members and supporters

Nygma Protection:

  • Zero-knowledge = cannot access even with court order
  • Encrypted names = can't identify file purposes
  • No metadata analysis possible
🚨

Forced Device Access

Detained and forced to unlock phones/computers containing sensitive organizational information.

Traditional Cloud Exposure:

  • All files visible when device unlocked
  • Contact lists exposed
  • Communications history revealed
  • Network mapping possible

Nygma Protection:

  • Duress Mode = show harmless decoy content
  • Real organizing documents stay hidden
  • Network stays protected
  • Plausible deniability maintained

Arrest & Extended Detention

Unable to access devices for extended periods, data remaining accessible to captors.

Traditional Cloud Exposure:

  • Data remains on devices/cloud indefinitely
  • Forensic analysis possible
  • Network reconstruction over time

Nygma Protection:

  • Time Bomb = auto-wipe after inactivity
  • Stealth mode (no email warnings that could expose you)
  • Guaranteed deletion if detained >X days
  • Movement stays protected even if you can't access
Real-World Protection

How Activists Use Nygma in the Field

Actual security setups for high-risk situations

📋

Protest Organization

Activist organizing protests in country with heavy surveillance and crackdowns

What's at Risk:

  • Attendee lists
  • Planning documents
  • Fundraising records
  • Communication strategies

Nygma Setup:

Real drive: "Movement Files"
- Attendee contacts (encrypted)
- Planning documents
- Funding records
- Strategy documents
Decoy drive: "Personal Research"
- Academic papers
- General news articles
- Public advocacy materials
Time Bomb: 2 weeks, Stealth Mode
(No email warnings that could be intercepted)

Protection: If arrested and forced to unlock → Shows decoy. If detained >2 weeks → Everything auto-wiped. Network stays protected, movement continues.

📸

Evidence Documentation

Human rights defender documenting abuses with photos and videos in dangerous environment

What's at Risk:

  • Evidence photos/videos
  • Witness testimonies
  • Location metadata
  • Source identities

Nygma Setup:

1. Capture evidence on phone camera
2. Immediately upload to Nygma (encrypted)
3. Delete local copies
4. Evidence now encrypted on cloud
5. If phone confiscated → Evidence already safe
Advanced Protection:
• Upload via mobile browser (before native app)
• Use duress mode if phone must have some photos
• Real evidence in real drive, innocuous photos in decoy
• Share evidence securely with international orgs

Protection: Evidence is immediately encrypted and backed up in the cloud. If device is confiscated, the original evidence remains protected and can be shared with international organizations.

🌐

Cross-Border Coordination

NGO coordinating across multiple countries, some with heavy internet surveillance

What's at Risk:

  • Secure document sharing
  • Protecting local partners
  • Maintaining operational security
  • Avoiding surveillance patterns

Nygma Setup:

Nygma Approach:
• Central encrypted drive for documents
• Password-protected shares for distribution
• Expiring links (auto-cleanup)
• No central point of failure
• Zero-knowledge = ISP/govt can't intercept meaningfully
Benefit:
Even if one person's device compromised, movement's
overall data stays protected. Compartmentalization.

Protection: Compartmentalized security means a breach of one device doesn't compromise the entire network. Zero-knowledge encryption ensures ISPs and governments cannot intercept meaningful data.

Security Configuration for High-Risk Work

Recommended setup for activists and NGOs

Suggested Plan: Professional (minimum)

Why Professional or Power:

Duress Mode (essential for forced access)
Time Bomb (protection if detained)
ChaCha20 encryption (faster on mobile)
Advanced sharing (controlled distribution)

Maximum Security Setup

  • Create strong, unique password (use password manager)
  • Enable 2FA authentication
  • Set up Duress Mode with believable decoy
  • Configure Time Bomb (2-4 weeks recommended)
  • Use Stealth Mode (no email warnings)
  • Save recovery key offline (not digitally)
  • Use encrypted file names (generic names)
  • Test duress detection thoroughly

Operational Security

  • Access Nygma via Tor Browser when possible
  • Use VPN in addition to encryption
  • Don't access from compromised networks
  • Log out after each session
  • Clear browser cache regularly
  • Use private/incognito mode
  • Don't save passwords in browser

Emergency Procedures

  • If compromised:
  • 1. Lock all drives immediately
  • 2. Change passwords from safe location
  • 3. Review audit logs for unauthorized access
  • 4. Consider triggering Time Bomb manually
  • 5. Notify network members

Secure Coordination Tools

Collaborate safely with your team and partners

Current Features

  • Encrypted file sharing with passwords
  • Expiring links (auto-cleanup)
  • Multi-file shares (up to 100 files)
  • Access tracking

Best Practices

  • One drive per campaign/project
  • Separate passwords for different access levels
  • Use expiring shares for time-sensitive materials
  • Revoke access when members leave
  • Regular security audits

Coming in Nygma Business

  • Team workspaces
  • Role-based access control
  • Shared encrypted drives
  • Organization management

Important Considerations

Nygma provides security technology to protect your privacy and data. However:

Legal Compliance:

  • • Know your jurisdiction's encryption laws
  • • Understand risks of duress mode use
  • • Consult legal experts for your situation
  • • Some countries criminalize encryption

Intended Use:

  • • Peaceful activism and human rights work
  • • Protecting legitimate organizational data
  • • Resistance to unjust surveillance
  • • NOT for illegal activities

Responsibility:

You are responsible for ensuring lawful use in your jurisdiction. Nygma provides tools, you ensure proper use.

Support for Human Rights:

We support peaceful activism and human rights defense. Contact us for NGO/activist organization pricing.

Frequently Asked Questions

Can Nygma protect against nation-state surveillance?

Zero-knowledge means even nation-states cannot decrypt without your password. Combine with Tor/VPN for maximum protection. No tool is perfect alone.

What if government forces me to provide password?

Use Duress Mode - provide duress password, show harmless decoy. Protects your network. BUT check local laws - some jurisdictions criminalize this.

Can I use Nygma for my organization?

Yes! Professional/Power for individual use. Nygma Business (coming soon) for team workspaces.

Do you offer discounts for activists/NGOs?

Contact us. We support human rights work and offer special pricing for registered NGOs and verified activist organizations.

Is encryption legal in my country?

Varies by jurisdiction. Check local laws. Some countries restrict or ban encryption. We cannot provide legal advice.

Digital Security Training

Security Training Resources

Combine Nygma with other security tools for maximum protection

Recommended Learning

  • Electronic Frontier Foundation (EFF) - Security guides
  • Access Now - Digital security helpline
  • Tactical Tech - Security-in-a-Box
  • Freedom House - Digital safety resources

Combine Nygma With

  • Signal - Encrypted messaging
  • Tor Browser - Anonymous browsing
  • VPN - Network privacy
  • ProtonMail - Encrypted email
  • Tails OS - Secure operating system

Nygma Security Workshops (Coming)

Best practices for activists
Threat modeling
Operational security
Emergency protocols

Protect Your Movement with Nygma

Start with a free account. Full Professional features.
NGO and activist organization pricing available.

Special NGO rates Priority support