Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
The revolution may not be tweeted, but modern activism is nonetheless often reliant on online organizing. This playlist will teach you how to understand the risks activists face and how to protect ...
If you lack proper support and access to LGBTQ resources, this guide teaches you how to explore such resources online in a safer way to help avoid accidental outing to your peers, family, or online ...
Congratulations! You've already taken steps to improve the safety of your online communications. Now you want to take it to the next level, and with this playlist, you can. You'll learn how to ...
Mobile phones have become commonplace and basic communications tools—now used not only for phone calls, but also for accessing the Internet, sending text messages, and documenting the world.
This playlist outlines how to assess the risks that you, your research subjects, and your data may face; and what to consider while conducting, storing, and reporting on research.
You’ve learned the general principles of Surveillance Self-Defense, and you’ve installed tools that can help. These guides describe the theory behind protecting ...
Nós somos a Electronic Frontier Foundation, uma organização sem fins lucrativos que há quase 30 anos trabalha para proteger a privacidade. O Guia de Autodefesa contra Vigilância é nossa ferramenta com ...
If you plan to send a secure message to someone who uses public key cryptography like PGP , you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such ...
Somos la Electronic Frontier Foundation, una organización independiente sin fines de lucro que trabaja para proteger la privacidad en línea desde hace casi treinta años. Esto es Autoprotección Digital ...
There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step ...