Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
With so many companies and websites offering tools geared towards helping individuals improve their own digital security, how do you choose the tools that are right for you? We don’t have a foolproof ...
This page was translated from English. The English version may be more up-to-date. This is an overview of network censorship, but it is not comprehensive. There are different ways of beating internet ...
What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
A program that runs all the other programs on a computer or device. Windows, Linux, Android and Apple's OS X and iOS are all examples of operating systems.
You have probably heard the term “encryption ” used in several contexts and associated with different words. Generally, encryption refers to the mathematical process of making a message unreadable ...
This page was translated from English. The English version may be more up-to-date. On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security ...
An add-on is a piece of software that modifies other software by changing how it works or what it can do. Often add-ons can add privacy or security features to web browsers or email software. Some add ...
To receive encrypted messages using public key cryptography (and to reliably inform others that a message genuinely came from you), you need to create two keys. One, the private key, you keep secret.