Home “Surveillance Self-Defense” Is A How-To Guide For Every Level Of Online Privacy

“Surveillance Self-Defense” Is A How-To Guide For Every Level Of Online Privacy

Whether you’re a journalism student wanting to learn security tips not taught in college classrooms, or a pro at keeping communications secure, the Electronic Frontier Foundation wants to make your activities online even safer from prying eyes.

The EFF’s new project called Surveillance Self-Defense is a collection of tools and resources broken down into specific resource “playlists” for both computer types and the people using them. These include: Mac user, human rights defender, student journalist, online security veteran, and a security starter pack for newbies.

Each playlist includes a step-by-step guide for protecting and securing your private communications. Most start with a introduction to threat modeling, or understanding what information you want to protect and from whom. From there, the guides cover various other tools and services for particular situations, like “Things To Consider When Crossing The U.S. Border,” in the human rights defender playlist.

The EFF’s SSD project also features a collection of tutorials to help people encrypt their phones, use PGP for different operating systems, and how to pick the best virtual private network. 

See also: NSA Whistleblower Edward Snowden: Keep Their Hands Off Our Data

The organization’s guide doesn’t claim to protect people from every credible threat, but it does a good job of delineating what technologies and services are the most helpful and necessary to protect data from hackers or adversaries.

After the Edward Snowden revelations, ongoing data breaches and personal information leaks, people are increasingly conscious of how and what they share online. Privacy hardware tools that aim to make data protection safe and simple have sprung up on the scene, just as quickly as their usefulness is debunked.

With EFF’s suite of tools and resources, even the most novice user can begin to take steps to secure their data, and begin communicating with friends and colleagues in a safer, more indestructible way.

Lead photo by JD Hancock on Flickr

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.