We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.
Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.
Popular Guides
- 制定安全计划
- Attending a Protest
- How to: Enable Two-factor Authentication
- How to: Detect Bluetooth Trackers
- 如何使用 WhatsApp
- 如何使用 Signal
Basics
- Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance
- Animated Overview: How to Make a Super-Secure Password Using Dice
- Animated Overview: Protecting Your Device From Hackers
- Animated Overview: Using Password Managers to Stay Safe Online
- Choosing Your Tools
- Communicating With Others
- Keeping Your Data Safe
- Seven Steps To Digital Security
- What Should I Know About Encryption?
- Why Communication Metadata Matters
- 创建安全性强的密码
- 制定安全计划
Tool Guides
- How to: Avoid Phishing Attacks
- How to: Delete Your Data Securely on Windows
- How to: Delete Your Data Securely on macOS
- How to: Delete your Data Securely on Linux
- How to: Detect Bluetooth Trackers
- How to: Enable Lockdown Mode on iPhone
- How to: Enable Two-factor Authentication
- How to: Encrypt Your iPhone
- How to: Understand and Circumvent Network Censorship
- 如何使用 Signal
- 如何使用 WhatsApp
- 如何加密 Windows、Mac 或 Linux 电脑
- 如何在 Linux 电脑上使用 Tor
- 如何在 Windows 电脑上使用 Tor
- 如何在 macOS 电脑上使用 Tor
- 如何在安卓和 iPhone 手机上使用 Tor
Further Learning
- A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?
- Attending a Protest
- Facebook 群组:降低风险
- How Do I Protect Myself Against Malware?
- Key Concepts in Encryption
- Key Verification
- Privacy Breakdown of Mobile Phones
- Privacy for Students
- Things to Consider When Crossing the U.S. Border
- What Is Fingerprinting?
- 社交网络中的自我保护
- 选择适合你的密码管理器
- 选择适合你自己的 VPN