We're happy to share that Surveillance Self-Defense is now available in 10 languages, including recently released Portuguese. We are grateful to all who have worked to make these translations available. SSD's other recent updates and changes include:
Keeping Your Data Safe
BitLocker's code is closed and proprietary, which means it is hard for external reviewers to know exactly how secure it is. Using BitLocker requires you trust that Microsoft provides a secure storage system without hidden vulnerabilities. On the other hand, if you're already using Windows, you are already trusting Microsoft to the same extent. If you are worried about surveillance from the kind of attackers who might know of or benefit from a back door in either Windows or BitLocker, you may wish to consider an alternative open source operating system such as GNU/Linux or BSD, especially a version that has been hardened against security attacks, such Tails or Qubes OS.
How to: Encrypt Your Windows Device
Our How to: Encrypt Your Windows Device outlines how to use open-source encryption suite, DiskCryptor, to encrypt your device. Please note that users have reported serious problems with DiskCryptor on Windows 8 with UEFI boot. We suggest you create a bootable disk image before attempting full disk encryption on these machines.
Surveillance Self-Defense Video Animations
As we mentioned before, EFF collaborated with AJ+ to create four video animations that have now been incorporated into SSD as standalone overviews.
- Protecting Your Devices From Hackers
- Using Password Managers To Stay Safe Online
- How to Make a Super-Secure Password Using Dice
- How Strong Encryption Can Help Avoid Online Surveillance
Why Metadata Matters
Those who collect or demand access to metadata, such as governments or telecommunications companies, argue that the disclosure (and collection) of metadata is no big deal. Unfortunately, these claims are just not true. Even a tiny sample of metadata can provide an intimate lens into a person’s life. Find out why metadata matters, who can access the metadata you transmit when you communicate, and how it might be used by checking out our new guide.
How to: Use OTR for Linux
We've added a new, step-by-step guide that explains how to use OTR for Linux. If you're a Mac or Windows user, please reference our other guides, How to: Use OTR for Mac and How to: Use OTR for Windows.
In the News
- A recent Citizen Lab report reveals a sophisticated phishing campaign targeting Iranian diaspora.
- A fake EFF site has been used as bait to distribute malware whose use has been connected to the Russian state.
- Peru’s executive branch adopted a legislative decree (DL 1182) dubbed "Ley Acosadora," or in English, "the Stalker Law," that allows warrantless access to Peruvians' location data.
- German domestic intelligence agency have been accused of trading its own data about their German citizens for access to the NSA's XKEYSCORE spying program.
- The UK government is looking to introduce an investigatory powers bill—a revival of the Snoopers' Charter with even more spying powers for the police and GCHQ.