Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
In all modern mobile networks, the cellular provider can calculate where a particular subscriber's phone is located whenever the phone is powered on and registered with the network. The ability to do ...
Your phone is filled with all sorts of antennas and sensors that collect a wealth of information. Here’s a rundown of some of them. The Global Positioning System (GPS) lets devices anywhere in the ...
With so many companies and websites offering tools geared towards helping individuals improve their own digital security, how do you choose the tools that are right for you? We don’t have a foolproof ...
The revolution may not be tweeted, but modern activism is nonetheless often reliant on online organizing. This playlist will teach you how to understand the risks activists face and how to protect ...
Tips and tools to help you more safely access LGBTQ resources, navigate social networks, and avoid snoopers. If you lack proper support and access to LGBTQ resources, this guide teaches you how to ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
Start from the beginning with a selection of simple steps. anchor link ...
There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step ...
This playlist outlines how to assess the risks that you, your research subjects, and your data may face; and what to consider while conducting, storing, and reporting on research.
نحن منظمة التخوم الإلكترونية وهي منظمة مستقلة غير ربحية تعمل على حماية الخصوصية على الإنترنت منذ ما يقارب الثلاثين عاماً. وهذا هو مشروع ...
You’ve learned the general principles of Surveillance Self-Defense, and you’ve installed tools that can help. These guides describe the theory behind protecting ...