For quick reference, we've created a handy guide designed to be printed, folded, and carried in your pocket (PDF download). Now, more than ever, citizens must be able to hold those in power ...
Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
In all modern mobile networks, the cellular provider can calculate where a particular subscriber's phone is located whenever the phone is powered on and registered with the network. The ability to do ...
Phones can get viruses and other kinds of malware (malicious software ), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...
The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose.
This page was translated from English. The English version may be more up-to-date. This is an overview of network censorship, but it is not comprehensive. There are different ways of beating internet ...
"Something you know, and something you have." Login systems that require only a username and password can be vulnerable to someone else obtaining (or guessing) those ...
This page was translated from English. The English version may be more up-to-date. Planning on crossing the border into the United States anytime soon? Did you know that the government has the right ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step ...