Choosing Your Tools
An Introduction to Threat Modeling
Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance
Animated Overview: How to Make a Super-Secure Password Using Dice
Animated Overview: Protecting Your Device From Hackers
Animated Overview: Using Password Managers to Stay Safe Online
Creating Strong Passwords
Keeping Your Data Safe
Seven Steps To Digital Security
What Is Encryption?
Why Metadata Matters
How to: Use KeePassX
How to: Use PGP for Linux
How to: Avoid Phishing Attacks
How to: Circumvent Online Censorship
How to: Delete your Data Securely on Linux
How to: Delete Your Data Securely on Mac OS X
How to: Delete Your Data Securely on Windows
How to: Enable Two-factor Authentication
How to: Encrypt Your iPhone
How to: Encrypt Your Windows Device
How to: Install and Use ChatSecure
How to: Use OTR for Mac
How to: Use OTR for Windows
How to: Use OTR on Linux
How to: Use PGP for Mac OS X
How to: Use PGP for Windows
How to: Use RedPhone (Android)
How to: Use Signal – Private Messenger
How to: Use TextSecure (Android)
How to: Use Tor for Windows
How to: Use Tor on Mac OS X
Protecting Yourself on Social Networks
The Problem with Mobile Phones
An Introduction to Public Key Cryptography and PGP
Attending Protests (International)
Attending Protests (United States)
Choosing the VPN That's Right for You
Communicating with Others
How Do I Protect Myself Against Malware?
Things to Consider When Crossing the US Border
Want a security starter pack?
Journalist on the move?
Online security veteran?
Activist or protester?
Human rights defender?