Skip to main content

Further Learning

You’ve learned the general principles of Surveillance Self-Defense, and you’ve installed tools that can help. These guides describe the theory behind protecting your digital privacy, and include common ways to apply it—online and off. Whether it’s learning more about the details of encryption , or tips on how to protect your privacy at a protest, you’ll find it here.

Choosing a Password Manager

How Do I Protect Myself Against Malware?

Key Verification

Attending a Protest

Things to Consider When Crossing the U.S. Border

Choosing the VPN That's Right for You

A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?

Protecting Yourself on Social Networks

Facebook Groups: Reducing Risks

Key Concepts in Encryption

Privacy for Students

What Is Fingerprinting?

Privacy Breakdown of Mobile Phones