Security resources organized by topic: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
[under construction] | [ 🚧 under construction] | ||
[[How to mitigate your risk of being subject to Pegasus surveillance]] | [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware. | ||
[[How to deal with online harassment and threats]] | [[How to deal with online harassment and threats]] | ||
Line 11: | Line 11: | ||
[[Safe internet browsing using VPN and Tor browser]] - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online. | [[Safe internet browsing using VPN and Tor browser]] - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online. | ||
Protect your information | === Protect your information === | ||
[[Ways to securely store and share files]] | [[Ways to securely store and share files]] | ||
Revision as of 23:41, 5 July 2023
[ 🚧 under construction]
How to mitigate your risk of being subject to Pegasus surveillance, and other spyware.
How to deal with online harassment and threats
Secure your devices - These resources will help you understand when to use full disk encryption and antivirus.
Protect your accounts using strong passwords, pw managers, 2fa - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts.
Safe internet browsing using VPN and Tor browser - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online.
Protect your information
Ways to securely store and share files
Tools for securely documenting human rights violations
Protect your communication
How the internet works