With so many companies and websites offering tools geared towards helping individuals improve their own digital security, how do you choose the tools that are right for you? We don’t have a foolproof ...
This page was translated from English. The English version may be more up-to-date. We've updated this guide to a new page. Please see the new version here. We ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
A program that runs all the other programs on a computer or device. Windows, Linux, Android and Apple's OS X and iOS are all examples of operating systems.
A tool that can encrypt and store your passwords using a single master password , making it practical to use many different passwords on different sites and services without having to memorize them.
This page was translated from English. The English version may be more up-to-date. On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security ...
Most devices let you delete data from them—for instance, you can drag a file to the Trash icon, or press delete in a photo album. But deletion does not always mean that the original data is gone.
An add-on is a piece of software that modifies other software by changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add ...
What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it ...
To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret.