Skip to main content
Surveillance
Self-Defense

Search

How to: Use PGP for Windows

<p class="warning"><span><strong>NOTE</strong>: This guide is not being actively reviewed or updated, and is currently retired. If you would like to use PGP via GnuPG, or Thunderbird with Enigmail, please refer to those services&rsquo; websites and documentation for information on how to install and use them.</span></p> <p>To use PGP to exchange...

How to: Use PGP for Linux

<p class="warning"><strong>NOTE</strong>: This guide is not being actively reviewed or updated, and is currently retired. If you would like to use PGP via GnuPG, or Thunderbird with Enigmail, please refer to those services&rsquo; websites and documentation for information on how to install and use them.</p> <p>To use PGP to exchange...

How to: Use PGP for macOS

<p class="warning"><strong>NOTE</strong>: This guide is not being actively reviewed or updated, and is currently retired. If you would like to use PGP via GnuPG, or Thunderbird with Enigmail, please refer to those services&rsquo; websites and documentation for information on how to install and use them.</p> <p>To use PGP to exchange...

Key Verification

Read Key Concepts in Encryption first if encryption keys are unfamiliar to you. When you communicate online using end-to-end encryption, each person you send a message to has their own unique public key. You use this key to encrypt messages to them, so that only they can decode them. But...

A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?

If used correctly, end-to-end encryption can help protect the contents of your messages, text, and even files from being understood by anyone except their intended recipients. It can also be used to prove that a message came from a particular person and has not been altered. In the past few...

Communicating with Others

Telecommunication networks and the Internet have made communicating with people easier than ever, but have also made surveillance more prevalent. Without taking extra steps to protect your privacy, every phone call, text message, email, instant message, video and audio chat, and social media message could be vulnerable to eavesdroppers. Often...

How to: Use OTR for macOS

NOTE: This guide is not being actively reviewed or updated, and is currently retired. If you would like to use Adium or another form of OTR messaging for macOS, please refer to those services’ websites and documentation for information on how to install and use them. Adium is a free and...

How to: Use TextSecure (Android)

TextSecure is a messaging app that allows users to send confidential messages with their mobile phone using end-to-end encryption. The app works over a Wi-Fi or data connection, but can also be used to send SMS if such a connection is unavailable. TextSecure can also be used to send SMS...

How to: Install and Use ChatSecure

ChatSecure is a free mobile phone application for iPhone and Android devices that allows users to communicate with off the record instant messaging. ChatSecure allows users to send instant messages and chats using a cell phone, instead of with a traditional desktop or laptop computer. It's compatible with iPhone and...

How to: Use OTR for Windows

<p>OTR (Off-the-record) is a protocol that allows users of instant messaging or chat tools to have conversations that are confidential. In this guide, you will learn how to use OTR using Pidgin, an open-source instant messaging client for Windows PC.</p>

How to: Use OTR on Linux

NOTE: This guide is not being actively reviewed or updated, and is currently retired. If you would like to use Pidgin or another form of OTR messaging for Linux, please refer to those services’ websites and documentation for information on how to install and use them. What is OTR? OTR...

Key Concepts in Encryption

Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong. The more you understand it, the safer you will be against such situations. We recommend reading the “What Should I Know About Encryption?” guide first if you haven’t already. In this guide,...