Skip to main content
Enter your keywords
Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance
Animated Overview: How to Make a Super-Secure Password Using Dice
Animated Overview: Protecting Your Device From Hackers
Animated Overview: Using Password Managers to Stay Safe Online
Choosing Your Tools
Communicating with Others
Creating Strong Passwords
Keeping Your Data Safe
Seven Steps To Digital Security
What Should I Know About Encryption?
Why Metadata Matters
Your Security Plan
How to: Avoid Phishing Attacks
How to: Circumvent Online Censorship
How to: Delete your Data Securely on Linux
How to: Delete Your Data Securely on macOS
How to: Delete Your Data Securely on Windows
How to: Enable Two-factor Authentication
How to: Encrypt Your iPhone
How to: Encrypt Your Windows Device
How to: Use KeePassXC
How to: Use OTR for macOS
How to: Use OTR on Linux
How to: Use PGP for Linux
How to: Use PGP for macOS
How to: Use PGP for Windows
How to: Use Signal for Android
How to: Use Signal on iOS
How to: Use Tor for Linux
How to: Use Tor for Windows
How to: Use Tor on macOS
How to: Use WhatsApp on Android
How to: Use WhatsApp on iOS
A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?
Attending a Protest
Choosing the VPN That's Right for You
Facebook Groups: Reducing Risks
How Do I Protect Myself Against Malware?
Key Concepts in Encryption
Protecting Yourself on Social Networks
The Problem with Mobile Phones
Things to Consider When Crossing the U.S. Border
Activist or protester?
Human rights defender?
Journalist on the move?
Online security veteran?
Want a security starter pack?
Copyright (CC BY)