Mobile phones have become commonplace and basic communications tools—now used not only for phone calls, but also for accessing the Internet, sending text messages, and documenting the world.
Phones can get viruses and other kinds of malware (malicious software ), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...
The revolution may not be tweeted, but modern activism is nonetheless often reliant on online organizing. This playlist will teach you how to understand the risks activists face and how to protect ...
In all modern mobile networks, the cellular provider can calculate where a particular subscriber's phone is located whenever the phone is powered on and registered with the network. The ability to do ...
Tips and tools to help you more safely access LGBTQ resources, navigate social networks, and avoid snoopers. If you lack proper support and access to LGBTQ resources, this guide teaches you how to ...
Below are step-by-step tutorials to help you install and use handy privacy and security tools. Surveillance Self-Defense encourages you to think about online privacy and security in a sophisticated ...
This playlist outlines how to assess the risks that you, your research subjects, and your data may face; and what to consider while conducting, storing, and reporting on research.
Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
You’ve learned the general principles of Surveillance Self-Defense, and you’ve installed tools that can help. These guides describe the theory behind protecting ...
Your phone is filled with all sorts of antennas and sensors that collect a wealth of information. Here’s a rundown of some of them. The Global Positioning System (GPS) lets devices anywhere in the ...
Congratulations! You've already taken steps to improve the safety of your online communications. Now you want to take it to the next level, and with this playlist, you can. You'll learn how to ...
If you run an organization whose work might be monitored by governments—either locally, or when you travel—you need to think about locking down your communications. Here's a basic guide for what to ...