Other translations
Trainers and teachers all around the world have independently localized and translated content from EFF’s Surveillance Self-Defense. Please note that EFF has not reviewed or checked these translations, and cannot vouch for their accuracy or whether they are up to date. In case of doubt, always compare them with the latest version on https://ssd.eff.org/.
Localized guides of Surveillance Self-Defense anchor link
Guides in Bahasa Indonesia, provided by Localization Lab: anchor link
Guides in Karen S'gaw Burmese, provided by Localization Lab: anchor link
- Communicating with Others
- Keeping Your Data Safe
- Creating Strong Passwords
- Choosing Your Tools
- Protecting Yourself on Social Media
- Attending a Protest
- Your Security Plan
- Understanding and Circumventing Network Censorship
Guides in Karen Po'o East Burmese, provided by Localization Lab: anchor link
- Choosing Your Tools
- Communicating With Others
- Creating Strong Passwords
- Protecting Yourself on Social Networks
Guides in Jingpho Burmese, provided by Localization Lab: anchor link
- Attending a Protest
- Keeping Your Data Safe
- Choosing Your Tools
- Communicating With Others
- Creating Strong Passwords
- Understanding and Circumventing Network Censorship
- Protecting Yourself on Social Networks
- Your Security Plan
Guides in Chinese (Traditional), provided by Open Culture Foundation and community: anchor link
Guides in Igbo, provided by Localization Lab: anchor link
- How to: Circumvent Online Censorship
- How to: Enable Two Factor Authentication
- Protecting Yourself on Social Networks
Guides in Khmer, provided by Localization Lab: anchor link
Guides in Swahili, provided by Localization Lab: anchor link
- Attending a Protest
- Choosing a VPN That's Right for You
- Creating Strong Passwords
- How to: Avoid Phishing Attacks
- How to: Enable Two-Factor Authentication
- How to: Use Tor on Android and iPhone
- How to: Use WhatsApp
- How to: Encrypt Your iPhone
- How to: Use Signal
- Key Concepts in Encryption
- Mobile Phones: Location Tracking
- Mobile Phones: Malware
- Mobile Phones: Phone Components and Sensors
- Mobile Phones: Spying on Mobile Communications
- Privacy for Students
- Protecting Yourself on Social Networks
- Understanding and Circumventing Network Censorship
Guides in Yoruba, provided by Localization Lab: anchor link
- Communicating with Others
- How to: Avoid Phishing Attacks
- How to: Circumvent Online Censorship
- How to: Protect Yourself on Social Media
- How to: Enable Two-Factor Authentication
- How to: Create Strong Passwords Using Password Managers
- Choosing Your Tools
Guides in Twi, provided by Localization Lab: anchor link
Guides in Romanian, provided by Localization Lab: anchor link
- How To: Use Signal for iOS
- How Do I Protect Myself from Malware?
- Mobile Phones: Phone Components and Sensors
- How To: Use Signal for Android
- Privacy Breakdown of Mobile Phones
- Mobile Phones: Spying on Mobile Communications
- Understanding and Circumventing Network Censorship
- Mobile Phones: Location Tracking
- Keeping Your Data Safe
- Mobile Phones: Malware
Guides in Georgian, provided by Localization Lab: anchor link
- How Do I Protect Myself from Malware?
- Understanding and Circumventing Network Censorship
- Mobile Phones: Phone Components and Sensors
- How To: Use Signal for Android
- Privacy Breakdown of Mobile Phones
- Mobile Phones: Spying on Mobile Communications
- How To: Use Signal for iOS
- Mobile Phones: Location Tracking
- Keeping Your Data Safe
- Mobile Phones: Malware