For quick reference, we've created a handy guide designed to be printed, folded, and carried in your pocket (PDF download). Now, more than ever, citizens must be able to hold those in power ...
The revolution may not be tweeted, but modern activism is nonetheless often reliant on online organizing. This playlist will teach you how to understand the risks activists face and how to protect ...
የግንኙነት ፕሮቶኮል በፕሮግራሞች ወይም በኮምፒውተሮች መካከል ውሂብን የማስተላለፊያ ዘዴ ነው። ተመሳሳይ ደንብ (ፕሮቶኮል) የሚጠቀሙ የሶፍትዌር ...
Somos la Electronic Frontier Foundation, una organización independiente sin fines de lucro que trabaja para proteger la privacidad en línea desde hace casi treinta años. Esto es Autoprotección Digital ...
Congratulations! You've already taken steps to improve the safety of your online communications. Now you want to take it to the next level, and with this playlist, you can. You'll learn how to ...
There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose.
Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
نحن منظمة التخوم الإلكترونية وهي منظمة مستقلة غير ربحية تعمل على حماية الخصوصية على الإنترنت منذ ما يقارب الثلاثين عاماً. وهذا هو مشروع ...
IMAP, birçok eposta programının, epostaları saklayan, gönderen ve alan servislerle haberleşmesi şeklidir. Eposta programınızdaki IMAP ayarlarını değiştirerek, epostalarınızı başka bir sunucudan ...
This playlist outlines how to assess the risks that you, your research subjects, and your data may face; and what to consider while conducting, storing, and reporting on research.