Mobile phones were not designed for privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to new kinds of surveillance ...
In all modern mobile networks, the cellular provider can calculate where a particular subscriber's phone is located whenever the phone is powered on and registered with the network. The ability to do ...
Phones can get viruses and other kinds of malware (malicious software ), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...
Your phone is filled with all sorts of antennas and sensors that collect a wealth of information. Here’s a rundown of some of them. The Global Positioning System (GPS) lets devices anywhere in the ...
With so many companies and websites offering tools geared towards helping individuals improve their own digital security, how do you choose the tools that are right for you? We don’t have a foolproof ...
If you run an organization whose work might be monitored by governments—either locally, or when you travel—you need to think about locking down your communications. Here's a basic guide for what to ...
Tips and tools to help you more safely access LGBTQ resources, navigate social networks, and avoid snoopers. If you lack proper support and access to LGBTQ resources, this guide teaches you how to ...
The revolution may not be tweeted, but modern activism is nonetheless often reliant on online organizing. This playlist will teach you how to understand the risks activists face and how to protect ...
Congratulations! You've already taken steps to improve the safety of your online communications. Now you want to take it to the next level, and with this playlist, you can. You'll learn how to ...
Start from the beginning with a selection of simple steps. anchor link ...
This playlist outlines how to assess the risks that you, your research subjects, and your data may face; and what to consider while conducting, storing, and reporting on research.