We’re the Electronic Frontier Foundation, a member-supported non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.
Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.
Popular Guides
- ستاسو د امنیت پلان
- Attending a Protest
- How to: Get to Know iPhone Privacy and Security Settings
- How to: Get to Know Android Privacy and Security Settings
- How to: Use WhatsApp
- How to: Use Signal
Basics
- د انکرپشن (په رمز د پیغام اړول څو نور یې ونشي لوستلای) په اړه زه باید په څه باندي پوه شم؟
- ستاسو د امنیت پلان
- Creating Strong Passwords
- Animated Overview: Using Password Managers to Stay Safe Online
- Seven Steps To Digital Security
- Animated Overview: Protecting Your Device From Hackers
- Why Communication Metadata Matters
- Communicating With Others
- Animated Overview: How to Make a Super-Secure Password Using Dice
- Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance
- Choosing Your Tools
- Keeping Your Data Safe
Tool Guides
- څنګه: په خوندي توګه خپل ډاټا (معلومات) پر وینډوز له منځه یوسئ
- څنګه دوه مرحله یي کره توب (تصدیق) فعاله کړو
- د شبکې سانسور باندې پوهیدل او د هغه لاره چاره (خنډ له مینځه وړل)
- How to: Use Tor
- How to: Manage Your Digital Footprint
- How to: Enable Lockdown Mode on iPhone
- How to: Get to Know Android Privacy and Security Settings
- How to: Encrypt Your iPhone
- How to: Encrypt Your Windows, Mac, or Linux Computer
- How to: Detect Bluetooth Trackers
- How to: Use Tor on Android and iPhone
- How to: Use Signal
- How to: Use WhatsApp
- How to: Avoid Phishing Attacks
- How to: Get to Know iPhone Privacy and Security Settings
Further Learning
- Choosing the VPN That's Right for You
- A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?
- Attending a Protest
- Key Verification
- How Do I Protect Myself Against Malware?
- Privacy for Students
- What Is Fingerprinting?
- Facebook Groups: Reducing Risks
- Key Concepts in Encryption
- Privacy Breakdown of Mobile Phones
- Protecting Yourself on Social Networks
- Choosing a Password Manager