The UX team interviews Enough users to help developers create better software


A platform for journalists, sources and human right defenders to communicate securely and privately.


Civilized discussions about bugs, support and feature requests. But also on governance, fund allocation and more.


Speakers available to talk on technical, legal and awareness aspects. Women speakers are actively encouraged to participate. The community organizes events, booths and more.

Code of Conduct

Every person who is in a space (online or IRL) under the responsibility of someone who claims to be a member of the Enough Community is expected to behave according to the Code of Conduct. And every member of the Enough Community is expected to help. If you feel unsafe or frustrated, please ask for assistance to the contact persons.


100% infrastructure as code, self-hosted, monitored, Ansible based and … integration tested.

From our blog

News from the Enough Community.

Malwares and backdoors: the Free Software approach

on August 14, 2020

Data and communications must be protected from backdoors and viruses that could compromise them. Viruses introduce themselves into computer systems and may destroy or exploit the data they contain. Backdoors are deliberately inserted by the designers of a software application for the purpose of gaining access to the machines running the application. Both viruses and backdoors allow the people who control them to do things like extract confidential information. The risk is real: in July 2020, the company Orange confirmed they were targeted by a malware that leaked data belonging to its business customers.

Continue reading

Get rid of intermediaries resisting encryption

on June 15, 2020

Back when our lives were not dominated by digital communications, eavesdropping on someone was expensive because it required people to do it. Letters had to be opened and copied. Microphones and tape recorders had to be discretely installed to record conversations. In the past twenty years things have changed, however: the number of intermediaries we use to communicate with one another has exploded, and surveillance is now automated. Not a year goes by without headlines in the news reminding us how much the State or corporations take advantage of these technological developments (and related changes in society) to exploit the private data of citizens, human rights defenders, and journalists.

Continue reading


on June 9, 2020

Who is we? In the context of a horizontal community, the word we has a different meaning than within not-for-profit organizations or companies. We are the individuals who have access to the resources that would enable them to modify how it is implemented. For instance, someone with access to the configuration of the web server can change the log retention policy. What information do we collect? We collect information from you when you register on our site and gather data when you participate in the community by reading, writing, and evaluating the content shared here.

Continue reading

If you want privacy, run your own videoconferencing service

on May 18, 2020

With remote working being more popular than ever and the need to organize activities on the net, our communications are increasingly going through videoconferencing services. Some of these services are criticized for how they use our personal data, but surveillance from law enforcement agencies is also cause for concern. Entrusting your data to a free service will always mean that you must believe the service provider’s assurances with regard to privacy.

Continue reading