We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.
Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.
Popular Guides
- ستاسو د امنیت پلان
- Attending a Protest
- How to: Get to Know iPhone Privacy and Security Settings
- How to: Get to Know Android Privacy and Security Settings
- How to: Use WhatsApp
- How to: Use Signal
Basics
- د انکرپشن (په رمز د پیغام اړول څو نور یې ونشي لوستلای) په اړه زه باید په څه باندي پوه شم؟
- ستاسو د امنیت پلان
- Why Communication Metadata Matters
- Animated Overview: Using Password Managers to Stay Safe Online
- Keeping Your Data Safe
- Animated Overview: Protecting Your Device From Hackers
- Seven Steps To Digital Security
- Communicating With Others
- Animated Overview: How to Make a Super-Secure Password Using Dice
- Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance
- Choosing Your Tools
- Creating Strong Passwords
Tool Guides
- څنګه: په خوندي توګه: خپل ډاټا (معلومات) پر لینکس (Linux) کې له منځه یوسئ
- څنګه: په خوندي توګه خپل ډاټا (معلومات) پر وینډوز له منځه یوسئ
- څنګه دوه مرحله یي کره توب (تصدیق) فعاله کړو
- د شبکې سانسور باندې پوهیدل او د هغه لاره چاره (خنډ له مینځه وړل)
- How to: Use WhatsApp
- How to: Encrypt Your Windows, Mac, or Linux Computer
- How to: Get to Know Android Privacy and Security Settings
- How to: Detect Bluetooth Trackers
- How to: Delete Your Data Securely on macOS
- How to: Get to Know iPhone Privacy and Security Settings
- How to: Use Tor
- How to: Use Tor on Android and iPhone
- How to: Avoid Phishing Attacks
- How to: Use Signal
- How to: Encrypt Your iPhone
- How to: Enable Lockdown Mode on iPhone
Further Learning
- A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?
- Attending a Protest
- How Do I Protect Myself Against Malware?
- Privacy for Students
- Choosing the VPN That's Right for You
- Key Concepts in Encryption
- What Is Fingerprinting?
- Facebook Groups: Reducing Risks
- Key Verification
- Choosing a Password Manager
- Protecting Yourself on Social Networks
- Privacy Breakdown of Mobile Phones