Author Topic: Surveillance Self-Defense  (Read 336 times)

staff3

  • Global Moderator
  • Newbie
  • *****
  • Posts: 210
Surveillance Self-Defense
« on: May 31, 2018, 06:27:35 PM »
Surveillance      Self-Defense

Tips, Tools and How-tos for Safer Online Communications
A Project of the Electronic Frontier Foundation

We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying.

Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.

New to Security?

All of our Starter Resources in One Place
Tool Guides
Software that Protects Privacy
Teaching Security to Others?
Check out our Security Education Companion
Popular Guides
Creating Strong Passwords
Assessing Your Risks
Protecting Yourself on Social Networks
How to: Use Signal on iOS
How to: Use Signal for Android
How to: Enable Two-factor Authentication

See all guides >
Basics
Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance
Animated Overview: How to Make a Super-Secure Password Using Dice
Animated Overview: Protecting Your Device From Hackers
Animated Overview: Using Password Managers to Stay Safe Online

Assessing Your Risks
Choosing Your Tools
Communicating with Others
Creating Strong Passwords
Keeping Your Data Safe
Seven Steps To Digital Security
What Is Encryption?
Why Metadata Matters
Tool Guides
How to: Avoid Phishing Attacks
How to: Circumvent Online Censorship
How to: Delete your Data Securely on Linux
How to: Delete Your Data Securely on Mac OS X
How to: Delete Your Data Securely on Windows
How to: Enable Two-factor Authentication
How to: Encrypt Your iPhone
How to: Encrypt Your Windows Device
How to: Use KeePassXC
How to: Use OTR for Mac
How to: Use OTR on Linux
How to: Use Signal for Android
How to: Use Signal on iOS
How to: Use Tor for Linux
How to: Use Tor for Windows
How to: Use Tor on macOS
How to: Use WhatsApp on Android
How to: Use WhatsApp on iOS

Further Learning
A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?
Attending Protests (International)
Attending Protests (United States)
Choosing the VPN That's Right for You
Facebook Groups: Reducing Risks
How Do I Protect Myself Against Malware?
Key Verification
Protecting Yourself on Social Networks
The Problem with Mobile Phones
Things to Consider When Crossing the U.S. Border
Security Scenarios
Academic researcher?
Activist or protester?
Human rights defender?
Journalism student?

More...


https://ssd.eff.org/en