For quick reference, we've created a handy guide designed to be printed, folded, and carried in your pocket (PDF download). Now, more than ever, citizens must be able to hold those in power ...
The revolution may not be tweeted, but modern activism is nonetheless often reliant on online organizing. This playlist will teach you how to understand the risks activists face and how to protect ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
Somos la Electronic Frontier Foundation, una organización independiente sin fines de lucro que trabaja para proteger la privacidad en línea desde hace casi treinta años. Esto es Autoprotección Digital ...
Tips and tools to help you more safely access LGBTQ resources, navigate social networks, and avoid snoopers. If you lack proper support and access to LGBTQ resources, this guide teaches you how to ...
A way to confirm automatically that a public key is correct (is really the one that's used by a particular entity) in order to prevent man-in-the-middle attacks. Most often used by websites to prove ...
Start from the beginning with a selection of simple steps. anchor link ...
If you plan to send a secure message to someone who uses public key cryptography like PGP , you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such ...
There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step ...
Phones can get viruses and other kinds of malware (malicious software ), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...
This page was translated from English. The English version may be more up-to-date. As with most chat apps, communications can be made between either individuals or a group, allowing you to send end-to ...
This playlist outlines how to assess the risks that you, your research subjects, and your data may face; and what to consider while conducting, storing, and reporting on research.