For quick reference, we've created a handy guide designed to be printed, folded, and carried in your pocket (PDF download). Now, more than ever, citizens must be able to hold those in power ...
Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step ...
Tips and tools to help you more safely access LGBTQ resources, navigate social networks, and avoid snoopers. If you lack proper support and access to LGBTQ resources, this guide teaches you how to ...
Start from the beginning with a selection of simple steps. anchor link ...
If you run an organization whose work might be monitored by governments—either locally, or when you travel—you need to think about locking down your communications. Here's a basic guide for what to ...
If you plan to send a secure message to someone who uses public key cryptography like PGP , you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such ...
The revolution may not be tweeted, but modern activism is nonetheless often reliant on online organizing. This playlist will teach you how to understand the risks activists face and how to protect ...
Phones can get viruses and other kinds of malware (malicious software ), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...