- Use the internet daily â for work, social media, and financial transactions.
- Want to secure your digital safety and privacy proactively but arenât in immediate danger. (If you are, reach out to someone in your community for a one-on-one consultation.)
- Feel comfortable with technology â you feel confident about changing the settings on your computer or smartphone.
- This guide draws from our work helping individuals and groups upgrade their digital safety practices, and from our experiences living and working in Canada, the US, Germany and Hong Kong.
- Wherever possible, we chose apps and tools that are accessible and easy to use over ones that are technically sophisticated but difficult to use. Our decision is based on our observation that people become clumsier in stressful situations, so it is important to keep procedures as simple as possible.
- Start from Level 1 and work your way up! Recommendations are sorted by increasing levels of difficulty.
- Level 1 is the quick essentials section. You should be able to work through it within 1 hour, and chances are, you're already familiar with many of the recommendations in there â but it never hurts to double check.
- Level 2 digs deeper into your device/app settings and will help you fine tune your privacy online. This section will take 1-2 hours, depending on how many accounts and devices you frequently use.
- At a minimum, do everything in Levels 1 and 2. It'll protect you from the most widely-used attacks while drastically decreasing the amount of personal information you're giving out for free.
- Level 3 ties up loose ends in your digital safety practice, but it does requires more time and money to complete. Depending on the amount of digital housekeeping required, this part may take anywhere from 1-4 hours.
- The scenarios shared after Level 3 are for higher-stakes situations. Scan them to see if any of them apply to you. (Because the stakes are higher, they assume youâve done everything in Levels 1â3.)
- This guide is a living document. Please feel free to submit a pull request or fork your version of this guide on GitHub.
- çšéŤä¸ć (Traditional Chinese)
- Deutsch (German)
- ćĽćŹčŞ (Japanese, a work-in-progress)
- TuĚrkçe (Turkish, a work-in-progress)
- Italiano (Italian, a work-in-progress)
- Looking to contribute another language? Send us a message to collaborate.
- Buy us a virtual coffee
- Share this guide with your friends and community!
- Send your feedback or contribute to the guide on GitHub.
- 7 January 2025
Threat modeling is a process that allows us to identify potential threats to safeguard against them. To build your threat model, ask yourself the following:
- âWhat kind of danger am I in?â E.g. credit card hacks, corporate espionage, or online harassment/doxxing.
- âWhat kind of assets am I protecting?â E.g. confidential documents, private photos, or personal messages.
Remember though, your threat model can change â either gradually over time or abruptly, say, when a new law is suddenly passed.
The weakest link is where your digital safety is most vulnerable. For example, if an accountâs forgot password function sends a link to your email, attackers only need to access your email to gain access to the account.
Encryption is the process of scrambling or encoding information to make it unreadable to passers-by and prevent unauthorized access. People often categorize encryption into these three types:
- No encryption: Any third party can intercept the data and read it as-is. Often called "plaintext."
- Standard encryption: Data is encrypted so that intercepting third parties cannot read it, but the platform being used to send the data (e.g. Facebook Messenger) can unscramble and read it. The platform may hand the unscrambled data to courts if ordered to do so.
- End-to-end encryption: Only the original sender and receiver can read the data. The platform being used to send the data only has the scrambled, unreadable version. So if courts order the platform to hand over the data, there's nothing useful to hand over.
Metadata is the contextual information surrounding your data. For example, the metadata for a phone call includes the number you called and the length of your call (but not the callâs contents). With enough metadata, attackers can piece together a relatively reliable picture of who you are, who you know, and where youâre going.
Unfortunately, legal protections around metadata tend to be weak or nonexistent.
- Imagine that an attacker gains access to all of your online accounts. Which of these accounts would be really painful to lose? List them out and write them down.
- Typically this list includes accounts used for email, online banking, social media, and maybe one or two related to work.
- The list should be short, and have less than 10 items.
The first lock is usually your account password. The second lock takes on a different form and/or comes via a different channel â most often as a code sent to your phone via an app or text message (SMS). This additional lock is usually called two-factor authentication (abbreviated as 2FA) or two-step verification.
- Turn on two-factor authentication for the important accounts you just identified. To find instructions on how to do so:
- Run an internet search for
two-factor authentication
and the account name - Look up the account provider on 2fa.directory
- Run an internet search for
- Use an authenticator app if one is available. They're more secure than using SMS to receive your 2FA code.
- Turn on cloud-backup for your authenticator app in case you ever lose your phone.
- Instructions for:
- 2FAS: Go to
Settings â 2FAS Backup
- Ente Auth: Create an account in the app
- 2FAS: Go to
- Instructions for:
- Make sure the answers to these questions are not easy to find out using public information about you. Security questions often get used to verify your identity during login or password resets, so they play a crucial role.
- Check the address bar for https:// If youâre using a webmail service, check that you're logging into it using an
https://
URL. If there isn't one available, find a new email provider. - Find out if your email service supports backup codes. Once you turn on 2FA, your email provider may provide single-use backup codes you can use if you lose your phone.
- Instructions for:
- Use a non-common/obvious unlock code for your phone with at least 10 digits. We recommend using a long string of numbers as it's easier to tap, but using both letters and numbers works too. Swipe patterns are not recommended, however, as they are too easy replicated by onlookers.
- To change it:
- iOS:
Settings â Face ID & Passcode â Change Passcode
- Android:
Settings â Security â Screen lock
- iOS:
- To change it:
- Set up a pin code for your mobile phone SIM card:
- Donât allow USB accessories to control a locked device:
- iOS: Turn off
Settings â Face ID & Passcode â Allow Access When Locked: USB Accessories
. - Android: Setting is off by default and is only available if
Developer Options
are turned on.
- iOS: Turn off
- For iOS devices, make sure
Stolen Device Protection
is turned on:Settings â Face ID & Passcode â Stolen Device Protection
- Turn on your computerâs firewall:
- macOS:
System Preferences â Security & Privacy â Firewall
. - Windows 10/11:
Start â Settings â Update & Security â Windows Security â Firewall & network protection â Microsoft Defender Firewall: On
- macOS:
- Turn off your computerâs remote access:
- macOS:
System Preferences â Sharing â Remote Login, Remote Management
. - Windows 10/11:
Settings â System â Remote Desktop â Remote desktop: Off
.
- macOS:
- Set up basic anti-virus software on your computer:
- macOS: None required.
- Windows 10/11:
Start â Settings â Update & Security â Windows Security â Virus & threat protection
Most new devices these days have automatic updates turned on by default, but itâs worth double checking:
- Check the update settings on your device operating system:
- On phones and tablets:
- iOS:
Settings â General â Software Update â Automatic Updates
- Android:
Settings â System â System update
- iOS:
- On computers:
- macOS:
System Settings⌠â General â Software Update â Automatic Updates
- Windows 11:
Start â Settings â Windows Update â Advanced options
- Windows 10:
Settings â Update & Security â Windows Update â Advanced options
- macOS:
- On phones and tablets:
- Check the update settings on your deviceâs main app store:
- iOS:
Settings â App Store â Automatic Downloads: App Updates
- Android: Open
Play Store
, then go toSettings â Auto-update apps
- macOS: Open
App Store
, then go toSettings â Automatic Updates
- Windows 10/11: Open the
Microsoft Store
, then go toProfile â Settings â App updates
.
- iOS:
- Turn off app-specific passwords that bypass two-factor authentication (where possible).
- Turn off automatically added calendar invitations, which can be used to send malicious links.
- Google Calendar Settings
â Event Settings â Add invitations to my calendar: When I respond to the invitation in email
- Outlook:
File â Options â Calendar â Automatic accept or decline â Auto Accept/Decline: Automatically Accept Meeting Requests and Remove Canceled Meetings
- iCloud: On iOS: Go to
Settings â [Your name] â iCloud â Saved to iCloud: See All â iCloud Calendar â Send & Receive â Receiving
and selectEmail
for each account.
- Google Calendar Settings
- Disable macros in Microsoft Office. Macros are small bits of code that automate actions which can be exploited by attackers. They can still be useful sometimes, which is why we recommend the
Disable all macros with notification
, which allows you to manually allow macros from trusted sources to run.- Instructions for:
- macOS
- Windows, which may require special settings for Excel
- Instructions for:
A phishing scam is an email or text message where an attacker is trying to trick you into giving your password or other login details. To defend yourself:
- Trust your instincts. If you feel like something is off â whether it's the way the text is written, the way the graphics look, or an unusual, first-time request from a service provider â it probably is.
- Check who it's from. Look over the sender's name and phone number or email address. If it's an email, be sure to closely read the bit after the
@
symbol. - But remember sender details can be faked. It happens rarely, but it is technically possible to put on a fake sender name, email or phone number. So checking the sender details is a not 100% foolproof process.
- Think twice before clicking a link. When in doubt, carefully examine the domain in the link. To look at it without opening the link:
- On mobile:
- iOS: Tap and hold on a link. A mini preview of the destination will appear. On the top right of this mini-window, tap
Hide preview
. From then on, iOS will show the full URL whenever you tap and hold on a link. - Android: Tap and hold on a link.
- iOS: Tap and hold on a link. A mini preview of the destination will appear. On the top right of this mini-window, tap
- On desktop:
- Firefox, Chrome, Edge: When your mouse cursor hovers over a link or button, the full URL will show up on the bottom left.
- macOS Safari: To turn on the above feature, go to
View â Show Status Bar
- macOS Mail: Hover your mouse cursor over a link and wait for a few seconds for a pop-up to appear.
- On mobile:
- After clicking links, scan the URL address bar in your web browser.
- Is there a red warning icon or 'Not Secure' label? This means the website is running unencrypted on
http
(rather thanhttps
). - Is the domain spelled incorrectly?
- Is there a red warning icon or 'Not Secure' label? This means the website is running unencrypted on
- So if thereâs any lingering doubt, donât click the link. In almost all cases, you donât actually need to click the link. If the message is linked to a transaction or account, you can always go to the original website to look up the details.
- Donât download/open unnecessary attachments.
- When in doubt, reply to the original sender to ask what it is.
- On email, preview attachments within the app or website. On Gmail and Proton Mail, simply clicking the attachment brings up its preview, which runs in a safe environment inside the mail program.
- Ask the sender to use a filesharing service (Dropbox, Google Drive, Tresorit), which also have their own online preview system.
- Upload suspicious attachments to VirusTotal to have them analyze it. Keep in mind files submitted to VirusTotal may be shared with multiple security researchers, so donât submit sensitive information.
- Device operating systems: If you get a notification on your devices to update the operating system, do it as soon as possible.
- Apps: If you see notifications about available updates, follow through and update the app.
- Firmware updates: Check occasionally for firmware updates for your router and other internet-connected devices.
- Donât enter passwords into in-app browsers. When a mobile app lets you browse a webpage without opening your web browser (i.e. an in-app browser), the app can record what websites you visit and what you type in them. So donât type anything sensitive in there.
- Donât plug in USB sticks/drives that you donât know into your computer. It might have malicious software on it.
- Wipe your devices properly before donating or giving them away. If youâve encrypted your phones and computers (as suggested earlier), a standard factory reset will work for most use cases.
- If you want an extra layer of security for your computer hard drives, see Wiredâs guide on this topic.
- Donât charge your phone at public charging stations/ports. They present a risk because attackers might steal your data. Instead, use a portable battery or bring our own adapter to plug directly into the power outlet.
đ Great job! You've secured
đ some important quick wins
đ for your online safety & privacy.
đ Please, do treat yourself to
đ a cup of tea and a stretch.
đ
đ Now, ready for Level 2?
Attackers commonly gain access to your account is if your password is:
- Too short.
- Too easy to guess.
- Itâs already been leaked as a part of a data breach/hacking incident and youâre use the same password in different places.
So it is crucial to use a different password for every account, and make sure that those passwords are very long and very hard to guess. To help come up with and store these long passwords, you can:
- Use apps calls password managers.
- Invent your own formula thatâs a wordplay on the service youâre logging into.
- Write them down with pen and paper.
What works best is different for everyone, and you donât have to stick to just one option â feel free to mix and match. For a longer walkthrough and explainer on the three options, see Michael Horowitzâs The world's BEST password advice article.
For now, focus on making sure the important accounts you identified in Level 1 have long, unique, hard-to-guess passwords . Here is a walkthrough of the three options:
This is a popular option for people who are comfortable navigating extra settings and dialog boxes. A password manager app helps generate long passwords, stores them, and fills them in almost automatically when you log into a website.
- Recommended password managers:
- We do not recommend password managers that come with your operating system or web browser because they do not work outside of their ecosystem (e.g. Apple Passwords wonât work on an Android phone).
- Install the password manager app on both your phone and computer.
- Install the password manager browser extension on your desktop web browser.
- Only create passwords with more than 12 characters. We recommend using the option in the password manager that strings together random, unrelated words (e.g.
plant-truck-nose-frame-lace
) so that it's easy to type in those rare instances when the autofill isn't working. - Next time you have to type in your password for another account, create an entry for it. This way, you will gradually add any frequently used accounts into the password manager. If you do this on the computer, the password manager's browser extension/add-on will capture the details automatically after you type them in.
- Transfer all of your accounts later. Entering all of your accounts into the password manager will take a while, and is a task best saved for another day. (We've placed this time-consuming task in our
Level 3
.) - Don't use your password manager as a two-factor authentication app. It's better to not put all your eggs in one basket.
This option is commonly used by people who have strong memorization skills and people who prefer having less apps to manage and dialog boxes to tap on their devices.
Hereâs an example of a simple formula from A Defensive Computing Checklist:
âŚa baseball fan might start every password with "BaseballRules!" Then, if "jungle" was their password for Amazon.com, the actual password is "BaseballRules!jungle" And, all you would have to remember would be that your Amazon password is "jungle". Pretty easy. Amazon. Jungle. And, the miserable password "book" for Barnes and Noble, becomes a good password ("BaseballRules!book") when run through the formula.
Add some extra punctuation marks, dashes and numbers to make the password a little longer and more irregular, and you have a pretty solid password formula.
This option usually supplements the other two options, and is useful for people who rarely ever lose (physical) things. Writing on paper is especially useful if you use a formula and want to note down some hints about the formulas youâve used.
In fact, password manager apps encourage people to print a sheet of paper with an account recovery code, and then write their master password on it. Here are the instructions for:
- 1Password: Get to know your Emergency Kit
- BitWarden: Recovery Codes (add your master password after printing)
Try to have a backup copy of these papers in a second location.
Remember, encryption is only fully effective when the device is off!
- Encrypt your computer hard drive.
- Instructions for:
- macOS.
- Microsoft Windows (use BitLocker if itâs available).
- Instructions for:
- Encrypt your phone storage.
- iOS: Automatically encrypts.
- Android: Almost always automatically encrypts. Double-check by going to
Settings â Security â Encryption
.
- Encrypt your backup hard drives.
- Instructions for:
- Log into the administration and settings dashboard. Itâs usually accessible by going to
http://192.168.0.1
in your web browser. Otherwise, check your instructions that came with your router. - Update the dashboard login if the password is simple.
- Review the devices currently connect to your network. You may have to explore until you find the
access control
. Make sure you know what every device on the list is. - Turn off the following options if you see them. (Look for them under
advanced settings
orgateway functions
):- UPnP (Universal Plug and Play)
- WPS (Wi-Fi Protected Setup)
- Remote Management
- Check for any software updates. Look for sections labeled
maintenance
,firmware
orsystem update
. Donât worry if you donât see it â that means itâs either up-to-date or automatic updates are hard set to on.
- Set up tracking or
Find My
, which will allow you to remotely find and wipe your devices by logging into a website if you ever lose them. - Instructions for:
- Review the privacy settings on social media platforms and messaging apps you frequently use. Check who can see your content, what information about you is being made public, and what you are sharing with third-party apps/advertisers.
- Wherever possible, turn off read receipts for messaging apps. It may seem inconvenient at first, but in the long run you will have more privacy and freedom when people don't know if you've read their messages or not.
- Here are links to and instructions for the most commonly-used platforms/apps:
- Platforms/apps with privacy settings available through a desktop browser:
- Facebook: Privacy checkup
- Google: Privacy checkup
- Youtube: Account privacy
- X/Twitter: Privacy and safety
- Reddit: Safety & privacy
- Platforms/apps with privacy settings only fully available through their mobile app:
- Instagram:
Settings â Privacy
- WhatsApp:
Settings â Account â Privacy
- Snapchat:
Settings â Privacy controls
- TikTok:
Profile â Settings and privacy â Privacy
- Telegram:
Settings â Privacy and Security
- Instagram:
- Platforms/apps with privacy settings available through a desktop browser:
- Limit how Facebook tracks you on other websites by clearing and disconnecting Off-Facebook activity.
- Review
Third-Party Apps
orConnected Apps
linked to major social media/email platforms. These third-party/connected apps have access to your data, and they might be selling it. - Instructions for:
- Review which apps on your smartphone have access to your location data. Turn off access for the apps that donât need it, and minimize the number of apps tracking your location.
- iOS:
Settings â Privacy & Security â Location Services
- Android:
Settings â Location â App location permissions
- iOS:
- Turn off your unique advertising ID number so that advertisers can't pinpoint you as easily:
- iOS:
Settings â Privacy & Security â Tracking â Allow Apps to Request to Track: Off
- iOS:
Settings â Privacy & Security â Apple Advertising â Personalized Ads: Off
- Android:
Settings â Security & Privacy â Privacy â Ads â Delete advertising ID
- iOS:
- On Android, turn off passive Wi-Fi and Bluetooth scanning.
Settings â Location â Location services â Wi-Fi scanning
Settings â Location â Location services â Bluetooth scanning
- Delete any apps that you donât recognize or havenât used in a long time. You can always re-download any of them if need be, though there will be a few apps that come with the operating system that cannot be deleted.
- Make sure to look for hidden apps as well. Instructions for:
- iOS: On the home screen, keep swiping left until you get to the
App Library
screen. Scroll to the bottom to theHidden
group. Tap to open and unlock using Face ID or passcode. - Android: See all apps including hidden ones in
Settings â Apps â See all apps
- iOS: On the home screen, keep swiping left until you get to the
- Make sure to look for hidden apps as well. Instructions for:
- Delete third-party keyboards on your phone. They often share what you type with the software maker.
- These keyboards are installed as apps on iOS and Android, so take the time to scan through all of your installed apps to find and delete them.
- If you need to use a third-party keyboard, make sure itâs an open-source project that others have verified and does not share your data with third parties.
- Disable ad tracking for computers running Windows. Instructions for:
- Review your web browser's privacy settings
- On your mobile:
- iOS Safari:
[iOS] Settings â Apps â Safari â Privacy & Security
. Make surePrevent Cross-Site Tracking
,Hide IP Address
andFraudulent Website Warning
are on. - Android Chrome:
[Chrome] Settings â Privacy and security
, turn onSafe Browsing
(either option),Always use secure connections
,Do Not Track
- Android Firefox:
[Firefox] Settings â Privacy and security
, turn onHTTPS-Only Mode
,Enhanced Tracking Protection
- iOS Safari:
- On your computer:
- macOS Safari:
Preferences â Privacy
, turn onWebsite tracking
andHide IP address
- macOS/Windows Chrome:
Preferences â Privacy and security â Cookies and other site data
, turn onBlock third-party cookies
,Do not track
- macOS/Windows Firefox:
Preferences â Privacy & Security
, turn onEnhanced Tracking Protection
(any option),Do Not Track
andHTTPS-Only Mode
(scroll to the bottom)
- macOS Safari:
- On your mobile:
- Install these web browser extensions/add-ons if your browser supports it. Make sure theyâre on even during private/incognito mode. The following extensions/add-ons are available for Firefox (macOS, Windows, Android) and Chrome (macOS, Windows):
- uBlock Origin, which blocks invasive ads.
- Privacy Badger, which blocks trackers.
- Decentraleyes, which decrease tracking on commonly-used resource files.
- Review your other web browser extensions/add-ons. Delete any that you havenât used in a while or donât remember installing.
- If you use smart speakers, turn off their recording function.
- Google Home: go to Activity Controls and uncheck
Include audio recordings
. - Amazon Alexa: Follow these instructions.
- Google Home: go to Activity Controls and uncheck
- For an Amazon Ring or Echo, turn off the feature that shares your internet with strangers.
- In the Alexa app:
Settings â Account Settings â Amazon Sidewalk
- In the Alexa app:
- For smart TVs, make sure to turn off the manufacturer's data tracking functionality, also known as automatic content recognition (ACR).
- Instructions from: Consumer Reports
- Review what data these platforms have on you. Delete out anything you don't need, if there are options to do so.
- Google: My Activity
- Facebook: Your Facebook information
- Amazon: Alexa Privacy Settings
- Microsoft: Account Privacy
- Post less personal information online. This includes information that can be used to identify/track/scam you (addresses, phone numbers, birthday, etc.).
- Set up a separate account under a pen name to leave local business reviews (on Google Maps, Yelp, etc.) if you write many of them. Otherwise, reviews will be shown under your real name and possibly give away your home location.
- When registering domains, make sure WHOIS/domain privacy is turned on. Many domain name registrars and webhosts offer this feature for free. Note: There are unofficial WHOIS lookup/history tools out there that make it hard to remove your information from the history log once youâve entered it at an earlier point in time.
Donât say anything youâd regret on in a âprivateâ group on Slack, Discord, Facebook, WhatsApp group chat, Telegram channel, or any âprivateâ online forum. Hereâs why:
- Anyone in the group can leak the data.
- Administrators usually have access to everything within the group, including deleted messages and private direct messages between two people.
- What you say can be traced back to your account's phone number or email. Even if you're not using your real name or photo.
- To prevent this in Telegram, go into
Settings â Privacy and Security â Phone Number
, and then set:Who can see my phone number
toNobody
.Who can find me by my number
toMy Contacts
.
- To prevent this in Telegram, go into
Always check whether your name appears publicly online for subscriptions, crowdfunds, petitions and donations. This is especially relevant if you have a unique name.
Some platforms that facilitate these things often have privacy settings, so itâs best to create an account with them to gain some control over what appears publicly. Some examples of important but often overlooked privacy settings:
- Patreon:
Settings â Accounts â Privacy
: Turn off bothFull public profile
andCommunity profile
. - Indiegogo: In the menu, go to
My Campaigns
. If you want to hide a project from your public profile:- Under
Campaigns I've Funded
, selectActions: Hide contribution
. - Then the page refreshes, but the project has simply moved down to
Campaigns Iâm Following
. There, selectActions: Unfollow
.
- Under
- GoFundMe: In the menu, go to
Your impact
. Then go to any campaign youâve supported. There, underYour donations
, you can change whether your name appears publicly.
- Restart your phone and computer once a week by turning it off and then back on to clean up its temporary memory (RAM) and so it runs smoother.
- When downloading a new mobile app, double-check to confirm itâs the right one. Many fake apps trick people by using a slightly modified name or icon of an existing, popular app.
- Regularly check the installed apps on your phone. Delete the ones youâre no longer using.
- Need to send someone a password? Split it in half and send it via two different channels. For example, send half of the password through email and the other half via a voice call.
- Donât use Google/X/Twitter/Facebook to sign up or log into other services, which gives these platforms unnecessary data about you. Each service should have its account.
đ Congratulations! You dove
đ fearlessly into your settings,
đ clicking, tapping, swiping,
đ which makes you a very, very
đ above average human being.
đ Now, you deserve a day off.
đ
đ When you come back,
đ be prepared to join
đ the upper ranks of safety
đ as you enter Level 3.
- Identify files you donât want others to access. This may include private photos, passport scans, and financial documents.
- For files on your computer, create an encrypted, password-protected vault for your files:
- Recommended tool: Cryptomator.
- Storing your vault on the cloud or on your computer are both fine. Decide based on how youâd like to backup the vault.
- Move your files into this secure vault. Make sure to delete the original copies after theyâve been moved into the vault.
- For documents on your phone, there are several options:
- Create a similar vault using an app like Cryptomator(đ° for mobile).
- If youâre on a paid plan for a password manager, the apps also let you store files in a section called
documents
orattachments
. đ° - iOS Files app has a
Lock PDF
feature for individual files. - Android Files by Google allows you to create a
Safe Folder
by following these instructions.
- For photos and videos on your phone, use the features in your default photos apps:
- iOS Photos: Open the photo and tap the
âŚ
button on the top right. TapHide
. This will put the photo in aHidden
folder in the Photos app (underUtilites
) that can only be unlocked with FaceID or a passcode. - Android Google Photos: Follow these instructions and read the section about automatic backups carefully.
- Android Gallery: The basic Gallery app doesnât support hidden photos, so download an alternative gallery app like Fossify Gallery and turn on password protection for hidden items in the settings.
- iOS Photos: Open the photo and tap the
- Buy a privacy screen for your laptop and phone. These stick-on sheets prevent onlookers from seeing what's on your screen. Examples for:
- Laptops: 3M Privacy Filters
- iPhone: Spigen EZ FIT GLAS.tR Privacy
- Place a sticker (or webcam cover) over your laptopâs front-facing camera.
- If you buy a webcam cover for a laptop, make sure it is less than 0.1mm thick so that it doesn't affect how the laptop closes.
- Don't use devices your workplace gives you for personal things. Either have separate devices for your work and personal lives, or, if it's too troublesome to have multiple devices, use your personal device for everything. Devices set up by workplaces often have monitoring systems that can be misused during disputes.
- Buy a mobile phone that always gets the latest software updates. Recommended phones:
- Apple iPhone
- Google Pixel Android
- Use a paid VPN service both when you're on a public network (e.g. cafĂŠ) and when you're at home (to decrease data shared with your internet/phone company).
2G cellular network technology is outdated and has security vulunerabilities that allow fraudsters to send fake text messages. To disable it on Android:
Settings â Network and Internet â SIMs â [Your carrier name] â Allow 2G: Off
- If that option doesnât appear, open the Phone app and enter
*#*#4636#*#*
. ATesting
screen will pop up. SelectPhone information
and then change theSet Preferred Network Type
to the same as the current selection minusGSM
. To see what each acronymn stands for, see Wikipediaâs Comparison of wireless standards page.
- Use apps with open source end-to-end encryption protocols and easy-to-use disappearing message timers.
- Recommended apps:
- Set messages to disappear. Pick an interval thatâs comfortable for you.
- Signal: Go to
Settings â Privacy â Disappearing Messages â Default Timer for New Chats
. - Wire: No app-wide setting exists. You have to set it up for each conversation by tapping/clicking the timer icon âą.
- Signal: Go to
- These apps also end-to-end encrypt video and voice calls, so continue using them wherever possible.
- End-to-end encryption for video/voice calls with more than 5 people may not be worth it. There are several reasons:
- Privacy is hard to maintain in large group calls as they often become quasi-public events due to the large number of participants.
- Support for end-to-end encrypted video/voice calls for larger groups is limited, and most platforms still collect the metadata around your call even when end-to-end encryption is switched on.
- Store and share files on the cloud using end-to-end encryption.
- Recommended apps: Tresorit, Proton Drive đ°
- For iCloud: Turn on Advanced Data Protection. See Appleâs instructions.
- Remember: files stored on Dropbox and Google Drive are not end-to-end encrypted.
- Backup your files online using an end-to-end encrypted platform.
- Recommended app: Arq đ°
Messaging apps use either your phone number or a username as the unique identifier (which other people use to add you on the platform). As such, your phone number or username is then visible to anyone you're in a group chat with, along with the name and photo in your profile.
Here's a breakdown of what unique identifiers are used for some popular messaging apps that offer some form of end-to-end encryption:
- Signal: phone number or username (depending on your settings)
- Wire: username (no one else can see the email or phone number you used to register your account)
- Telegram: phone number by default but you can set up a username and then stop sharing your phone number:
Settings â Username
Settings â Privacy and Security â Phone Number â Who can see my phone number: Nobody
- WhatsApp: phone number
If you don't want to give out your personal phone number, consider getting a virtual phone number from one of the providers listed in our scenario for Masking your identity for online dating, events, or organizing
.
- Set up a username so people can find you with it rather than your phone number. To create a username:
Settings â
[Tap your profile icon or name]â @ Username
- Hide your phone number.
- Go to
Settings â Privacy â Phone Number
, and set both toNobody
.
- Go to
- Turn on the extra layer of pin code protection and prevent others from logging in with your phone number.
Settings â Account â Signal PIN
Settings â Account â Registration Lock: On
- Turn on two-step verification to prevent someone from moving your account without your permission.
Settings â Privacy and Security â Two-Step Verification
- Hide your phone number:
Settings â Privacy and Security â Phone Number
, and then setWho can see my phone number
toNobody
.
- Start conversations by using
New Secret Chat
so that they are end-to-end encrypted. All other conversations and groups are not. Unfortunately, that this means your messages will not show up in your desktop or web app.
- Turn on security notifications on WhatsApp to get a notification when a person you're talking to switches to a new device.
Settings â Account â Security â Show Security Notifications on This Phone: On
- Turn on two-step verification to prevent someone from moving your account without your permission:
Settings â Account â Two-Step Verification: Enable
- If you backup chats, make sure they are end-to-end encrypted, or turn backup off altogether.
Settings â Chats â Chat Backup â End-to-end Encrypted Backup
- For iOS users who use
iCloud Backup
(not end-to-end encrypted) to backup their entire phone, make sure WhatsApp is not included as part of the process. ThisiCloud Backup
should not be confused with WhatsApp's interal backup feature that also uses iCloud.[iOS] Settings â
Your nameâ iCloud â Manage Storage â Backups â
deviceâ WhatsApp: Off
- Stop automatically downloading any and all photos and videos your receive:
Settings â Chats â Save to Camera Roll: Off
- iOS:
Settings â Emergency SOS
- Android:
Settings â Safety & emergency â Emergency SOS
You made unique passwords for important accounts in Level 2
, now itâs time to deal with the rest of your online accounts.
- Make a list of any active accounts and any accounts with your private information. Donât worry about finding every last account, you can always deal with them later.
- If you no longer use the account, consider logging in to deactivate/delete it. A few accounts might have sentimental value, but most wonât.
- For the accounts you want to keep, make sure each of them uses a unique, hard-to-guess password. Review our
Level 2
recommendations about making good passwords if need be.- If you are using a password manager, now is the time to transfer everything onto there:
- The fastest way to enter the details is to logout and login to each account on your computer, and let the password manager's browser extension/add-on capture the details automatically.
- In some cases, the password manager may warn you that the password you have is weak. If so, spend that extra minute on the account website to change to a new password.
- When youâre all done, use your password managerâs monitoring feature to double check stored passwords to see if it's too short, has been reused, or has already been leaked as part of a data breach. In 1Password, this feature is called
Watchtower
, and in Bitwarden itâs calledVault Health Report
.
- If you are using a password manager, now is the time to transfer everything onto there:
đ˛ Wow, you really did it.
đ˛ You finished all 3 levels!
đ˛ You deserve a reward â
đ˛ a cookie, perhaps,
đ˛ but not the tracking type.
đ˛
đ˛ Rest for the rest of the week
đ˛ and when you're well rested,
đ˛ come back and check out
đ˛ the scenarios below.
- Consider using a nickname or only your first name (if your first name is common where you live). This is especially important if your full name is very unique, which makes it very easy to search for online.
- Consider using a persistent pseudonym or collective identity, especially if youâre a public figure. For more information on how and why, see:
- Tactical Tech: Zen and the art of making tech work for you
For messaging apps using phone numbers as the primary identifier (e.g. Signal, WhatsApp, Telegram), get a secondary number from:
- Paid online services đ° (more reliable)
- Free online services đ
- TextNow:: Offers ad-supported US and Canada numbers
- Google Voice:: Offers a free US number, but is only available in the US
- Your local phone companies đ°
- Get a prepaid or cheap SIM card plan
Note: If you lose/unsubscribe to your secondary phone number, other people can buy it and impersonate you.
For sites and services that use email as the primary identifier/username, get a new đ email account or an email alias that forwards to your main account from:
- SimpleLogin:: Based in Switzerland (as part of the Proton Mail/VPN group)
- addy.io: Based in the UK and EU
- Sign up for a privacy-focused virtual credit card đ° from Privacy (only available in the US). It helps a) mask who you are to the seller, and b) mask what you've bought from the bank.
- Buy a prepaid credit card at a local convenience store. But be careful, these cards donât always work for online shopping depending on where you are.
- Get a virtual credit card for free trials at Do Not Pay for those cases where you want to sign up for a free service period but not give out your real credit card information.
- Ask to be paid in gift cards, which can be used in stores without tracking.
Even with all the third-party services above, courts can still compel companies to hand over information about you. So if you are really in a high-risk situation, you may need to do all of the above and more. For one example of this, see Matt Mitchell's PRIVACY RECIPE: Creating an online persona.
When it comes to attending a protest, there are many, many considerations depending on where you are and who you are. In this guide, we are only going to make general recommendations related to technology.
- Use an end-to-end encrypted messaging app and make sure disappearing messages is turned on. See the encrypted messaging app part of
Level 3
above. - Double-check the privacy settings in your messaging apps.
- Turn off message previews in your notifications.
- iOS:
Settings â Notifications â Show Previews: When Unlocked
. - Android:
Settings â Apps & notifications â Notifications â Notifications on lock screen â Sensitive notifications: Off
.
- iOS:
- Restart your phone by turning it off and then back on to clean up its temporary memory (RAM) and so it runs smoother.
- Turn off location history:
- iOS:
Settings â Privacy & Security â Location Services â System Services â Significant Locations
. - Android:
Settings â Security and privacy â More privacy settings â Activity controls â Location History.
- Google Maps: Tap your profile picture
â Settings â Maps history â Saving to Web & App Activity â Turn off: Turn off and delete activity
.
- iOS:
- Delete past location history:
- iOS:
Settings â Privacy â Location Services â System Services â Significant Locations â Clear History
. - Android:
Settings â Security and privacy â More privacy settings â Activity controls â Location History.
- iOS:
- Consider turning off all location services temporarily:
- iPhone:
Settings â Privacy â Location Services â Location Services: Off
. - Android:
Settings â Location â Use location: Off
.
- iPhone:
Your location can be tracked by third parties through your phoneâs SIM card connection. Tracking is done using devices (often called IMSI catchers) that simulate mobile-phone towers, which log both your SIM cardâs unique identity number and rough location. To preserve your privacy completely, youâd have to turn off your phone or set up a burner phone. To limit the amount of tracking, disable 2G on your phone:
- Android:
Settings â Network and Internet â SIMs â [Your carrier name] â Allow 2G: Off
. - Android alternative: If that option doesnât appear, open the Phone app and enter
*#*#4636#*#*
. ATesting
screen will pop up. SelectPhone information
and then change theSet Preferred Network Type
to the same as the current selection minusGSM
. To see what each acronymn stands for, see Wikipediaâs Comparison of mobile phone standards page. - On iOS: Turn on Lockdown Mode by going to
Settings â Privacy & Security â Lockdown Mode: On
. This launches a range of restrictive safety precautions (including disabling 2G) that youâll probably want to turn it off after you return home safetly.
- Draft a message to a trusted friend or legal hotline beforehand. Prepare to hit send if arrested at the protest or if thereâs an emergency.
- As a backup, write down the phone number of the trusted friend/hotline on your arm with a permanent marker.
- Charge your phone fully and bring a spare battery.
- Clean out any sensitive personal information on your phone. Delete any photos, chat logs, and notes that can be used against you.
- If you use your fingerprint or face to unlock your phone, turn it off before the protest. In some jurisdictions, officers can compel you to provide your fingerprint but not your passcode.
- Dress up to not stand out. Wear plain clothes that don't attract attention, cover up visible tattoos, and put on a face mask. Make it harder to be easily identified from a photo and by facial recognition technology.
- A burner phone is a single-use, disposable phone and SIM card that you buy with cash. Ideally, it makes you anonymous to the phone company and online services, and not reveal information about you if someone takes or steals your phone.
- Burner phones require extra time and money to set up. For example, see Micah Lee's guide on setting one up in the US.
- Decide what you want to use a burner phone for, and what that use might reveal about you. Every action you perform with your phone creates a clue about who you are. E.g. if you activate it at home, it will give away your home address.
- Do you need a burner phone and SIM card or do you just need a burner virtual phone number? For the latter, see the scenario above:
Masking your identity for online dating, events, or organizing
.
- Power off your phone if there's risk of an imminent arrest or phone seizure. Encryption works best when devices are off.
- Try not to take photos or videos where peopleâs faces are visible. Taking a photo of peopleâs backs is okay. The one exception is if youâre filming a video of a conflict where documentation is critical.
- If there are faces captured in a photo/video, make sure to blur them before sharing them online.
- Recommended tools:
- Phone: Signalâs photo blur tool
- Computer: Everest Pipkinâs Image Scrubber
- Computer: YouTubeâs blur faces tool
- Recommended tools:
- For further anonymity, erase the location metadata before sharing a photo/video.
- Recommended tools:
- Computer: Everest Pipkinâs Image Scrubber
- iPhone: Take a screenshot of the photo and share the screenshot
- Android: Scrambled Exif
- Recommended tools:
Mutual aid groups often include people with different backgrounds, so itâs very likely that at least one person in the group wonât be up-to-date on their digital safety practices. So the chances of an accidental data leak are much higher. Luckily, there are things you can do to minimize the damage done if that happens.
- Obscure your identity in the group:
- Consider using a nickname or only your first name (if your first name is very common where you live).
- Donât use a photo of yourself as your profile picture. Use a photo of an animal, cartoon character, etc.
- Split up who has access to your groupâs private data (e.g. community contact details and shared passwords). Not everyone needs access to everything. Here are some ways to split up who can access what:
- Create different access level groups. Access can be based on how long someone has been in the group, how good they are with technology, or which projects they are working on.
- Fragment a document into pieces. Make it so that different people have access to different parts of the document.
- Assign one or two people as the documents/data managers. But make sure that these people are well-versed in digital safety practices and stay home during risky public gatherings.
- Donât use email to communicate, only use it to sign up for accounts. Emails create metadata trails and tend to sit in peopleâs accounts for too long.
- If you and your group plan on gathering publicly and in-person, consider the recommendations in the scenario
Attending a protest
. - If your work includes being visible to the public (you help people in public spaces or appear on video interviews), consider taking your photo and full name off of your employer or school websites. This is to prevent people who disagree with your group from harassing your employer or school.
Sometimes you will have to compromise on using the most technically secure app to using one that people are already familiar with. The one baseline requirement thatâs worth fighting for is to use an app with support for disappearing messages (and to make sure itâs turned on).
We recommend:
- Signal:
- â End-to-end encrypted group chats.
- â Cannot delete a group chat.
- â
People in the chat can only see your phone number if itâs already in their phoneâs address book by default, and you can even turn that off:
- Go to
Settings â Privacy â Phone Number
, and set both toNobody
.
- Go to
- â Supports audio & video group calls
- Turn on disappearing messages:
- In the chat, tap the group name at the top of the screen and then selecting
Disappearing Messages
.
- In the chat, tap the group name at the top of the screen and then selecting
- Wire:
- â End-to-end encrypted group chats.
- â Only shows your username to other people in the chat.
- â Can delete a group chat.
- â Requires paid plan for audio & video group calls.
- Turn on disappearing messages:
- In the chat, tap the timer icon âą at the bottom of the screen.
We donât currently recommend Telegram, but it remains a popular choice for group chats. So weâve included notes below on how to use it more safely:
- Telegram:
- â No end-to-end encrypted group chats.
- â Hard-to-find settings to hide phone number.
- â Hard to turn on disappearing messages.
- To hide your phone number:
- Go to
Settings â Privacy and Security â Phone Number
, and then set:Who can see my phone number
toNobody
.Who can find me by my number
toMy Contacts
.
- Go to
- Turn on disappearing messages by:
- In the chat, tap the group name at the top of the screen, then tap the three dots at the top right of the screen, then tap
Auto-Delete
.
- In the chat, tap the group name at the top of the screen, then tap the three dots at the top right of the screen, then tap
We do not recommend using WhatsApp at all. While its group chats are end-to-end encrypted, there are many downsides:
- â Your contacts list is sent to Meta/Facebook.
- â All chat metadata is sent to Meta/Facebook.
- â Everyone in the chat can see your phone number.
- â By default, it automatically downloads all shared images and videos.
- â By default, its chat backups arenât end-to-end encrypted.
Groups often use social media platforms (e.g. Instagram, X/Twitter) to post updates about their work. One popular alternative is to use Telegramâs Channels to broadcast messages one-way to a large audience (with no comments or replies). The advantages of Telegram Channels:
- You can create a publicly searchable or private invite-only channel.
- Followers/readers subscribe to your channel and receive all of the updates (compared to traditional social media where you have to compete for attention and reach).
When your group grows, it may make sense to set up a more public online space to work with new members. Groups often migrate to platforms like Slack, Mattermost and Discord, which allow for multiple chatrooms within the same space. However, because these platforms are designed for corporate workplaces or public gaming communities, their privacy features are very limited. So we recommend using these platforms only for public outreach or for quasi-public messaging.
Video call apps are tricky because not many of them support end-to-end encryption, and even those that do often collect your metadata. Having said that here is what we recommend:
- For small groups of ten or less, use Signal. Its calls are end-to-end encrypted and it doesnât collect any metadata. Unfortunately, it doesnât work well with slower internet connections and only allows a maximum of 40 people on a call.
- For larger groups:
- If you have a technical group member who is skilled at system administration, set up your own BigBlueButton or Jitsi server. Encryption matters less when you control the data (i.e. you can delete it after each call).
- Otherwise, fall back on big tech platforms Zoom or Google Meet. (Zoom might seem like a safer bet because of its end-to-end encryption feature, but it also has a poor track record of security issues.) Remember though, both platforms collect your metadata and the host has to have a registered account.
There are two paths groups take when it comes to picking collaboration apps/platforms:
- Use Googleâs apps because theyâre more accessible.
- Use open-source alternatives because they have better privacy features.
Hereâs the rundown on both of these paths.
Google Workplace (Docs, Sheets, Drive, etc.) is a popular choice for collaborative work because its apps are powerful, easy-to-use and work well on mobile devices. But they also carry serious privacy limitations:
- Anyone who opens a document or file can see the creatorâs profile picture, name and email address tied to their Google account.
- The activity log on documents also shows the details of who has made edits.
- None of your data is end-to-end encrypted.
To mitigate these pitfalls:
- Create a view-only webpage of your Google document or spreadsheet by going to
File â Share â Publish to web
. Itâs hosted for free by Google, and doesnât show who is creator is. (Unfortunately, this feature is available on the computer and not on mobile devices.) - Obscure your identity:
- Create a separate Google account under a fake name to create documents and upload files.
- Edit your own Google account profile to use a nick name or only your first same. Unfortunately, this changes how your name is displayed on all Google apps (including Gmail).
- Open a private/incognito window when editing other peopleâs documents.
Our recommended apps/platforms with notes about their accessibility limitations:
- Riseup Pad: A browser-based text editor that doesnât require any accounts. But this anonymity comes with limitations: anyone with the link can edit/delete the pad, pads will auto-delete after 60 days of inactivity and have a maximum lifespan of one year (so remember to backup).
- Cryptpad: A browser-based platform that has apps for end-to-end encrypted text editing, spreadsheets and slides. The only downside is that people may experience loading problems on mobile devices.
- Tresorit Send is a website that allows you to upload end-to-end encrypted files (up to 5 GB) and share them with a link. No account registration needed, but thereâs also no way to update the files in the link.
- CryptDrive and Proton Drive are both Google Drive alternatives that are a bit more private. They allow you to store files and folders online, share them with a link and update them afterwards. Unlike Google Drive, sharing a link wonât show your username or email, but both platforms do require you to have an account, which means the files are ultimately still traceable to you on the server side. Free plans come with 1 GB and 5 GB of storage respectively.
Getting the care you need can be a controversial and fraught endeavor in many parts of the world. Here are some recommendations that may apply if you live in one of those places.
- Look up health information without being tracked using Tor Browser. It doesnât work well for websites requiring login, but you shouldnât be logging in anyway to prevent tracking. There is no official iOS app because it leaks a bit of data, so use the computer version if youâre an iPhone user.
- If you need to login to an account, be aware there will be a data trail and work to minimize it:
- Hide what websites your visit from your internet provider by using a VPN.
- Recommended đ° VPNs: Mullvad, IVPN
- Recommended free VPN: Proton VPN (free for one device)
- Minimize what websites can see by opening up a private/incognito window on your web browser. This also makes sure your browsing history isn't saved to your device. Alternately, use a different browser in private mode only for health research to further compartmentalize data.
- Hide what websites your visit from your internet provider by using a VPN.
- Think twice before sharing information, and when you do, use an end-to-end encrypted messaging app with disappearing messages on. (Avoid email.)
- Use end-to-end encrypted messaging apps recommended in the
Level 3: Use end-to-end encrypted apps
section, and remember to turn on disappearing messages. - Do not use email or other messaging apps that create a data trail.
- Use an app that stores your data locally or use pen and paper.
- Consider using a nickname.
- Use a secondary phone number. Either buy a SIM card with cash or get a virtual number (run by a company in a place that favors reproductive rights).
- For our list of virtual number services, see the scenario above:
Masking your identity for online dating, events, or organizing
.
- For our list of virtual number services, see the scenario above:
- Use an end-to-end encrypted email address. Consider setting up a new one just for this purpose.
- Recommended services: Proton Mail, Tuta Mail
- Hide your transactions by paying with:
- Cash
- A prepaid credit card you bought with cash
- A privacy-focused virtual credit card from Privacy (only available in the US).
- If you are physically going to a clinic and think it will be a risky situation, follow the recommendations in the above scenario:
Attending a protest
. - Do not bring your phone with you to the clinic. At the least, leave the phone at home or at the hotel during this last part of the journey.
- Kendra Albert, Maggie Delano, and Emma Weil's Okay, Fine, Letâs Talk About Period Tracking: The Detailed Explainer
- Turn off your devices.
- Storage/hard drives are only encrypted when off, not when theyâre just in sleep mode.
- This will also ensure that your mobile devices can only be unlocked using a pin code, which is protected by freedom of speech laws in some jurisdictions.
- Backup before you depart and keep a copy at home in case your devices are lost in transit.
- Store less information on your devices. They canât take what you donât have if your devices are seized.
- 1Password users can use the appâs Travel Mode to remove certain passwords from the device during a trip.
- Be mindful of what stickers you put on your devices. A border agent could mistake them for something suspicious.
- Decide beforehand what you will do if you are asked to unlock your devices. Searches sometimes happen as a routine part of border crossing.
- Attach a tracking tile/tag to bags youâre worried about.
- Notify your people about your flight number and arrival time. Regularly check in with one of them at points in your journey (e.g. âThey just finished scanning my bags!â). Have them contact a lawyer/relevant organization if you do not show up.
- If the process becomes uncomfortable, consider going back home for now. Sometimes you get unlucky and going through with it is not worth the stress. Tell them you are withdrawing your application, no longer want to enter the country, and want to go home.
Note: Some of these practices might raise suspicions and backfire.
- Create an alternate universe version of yourself... digitally. Create photo albums, email addresses, and social media accounts full of vanilla content.
- âForgetâ half of your password. Password lock your device/account so that only a trusted friend has the second half of the password.
- Log out of all important accounts. Or leave your devices at home.
- Consult a lawyer beforehand. Keep a printed copy of their contact information with you, so you can contact them easily.
- Be aware that phone companies might share your location and personal info with others without your permission.
- Setup a VPN beforehand to:
- Download these offline apps in case there are connectivity issues:
- An offline messaging app to send text messages to people nearby if the internet goes down by using Bluetooth.
- Recommended: Bridgefy â but you need to open the app with an internet connection to setup your account!
- An offline maps app
- Recommended: Organic Maps
- An offline messaging app to send text messages to people nearby if the internet goes down by using Bluetooth.
- Consider traveling with a burner phone while leaving your laptop at home. This will be especially useful if you need to install new/untested software for work that might violate data privacy policies.
- Re-evaluate which online platforms are safe to use.
- See how often a platform hands over its data by looking up their transparency reports.
- Look up the location of the platform's global headquarters and see where the nearest local/regional office is. Location affects a platform's relationship with the authorities and its privacy policy.
- Donât say anything you wouldnât say in public. Encourage your attendees to do the same. Most commercial platforms have access to your audio/video data and mine your metadata to create consumer profiles.
- Limit the amount of control an audience member has.
- For example, for most Zoom events, it's not necessary for everyone to have screensharing access.
- Don't make the meeting link too public. Either set a meeting password or set up an RSVP system so that you donât have to give out the meeting link and password publicly.
- Create a user/content moderation plan.
- If you have co-hosts or moderators, make sure they are set up in the online system as administrators/editors/moderators.
- Familiarize yourselves with what filtering/muting/blocking powers you have as a host/moderator.
- Create an emergency plan of action around what you would do if a malicious troll enters your event.
Harassment and doxxing tend to be very specific situations, which vary drastically depending on who you are, what you do, who the attacker is, etc.
While we have some general recommendations below, we suggest seeking additional information from someone in your community and from an online resource/guide that hews closer to your exact situation.
Do not force yourself into a corner by going at this alone!
- Baseline: Ask a trusted friend to hold space for you and your situation. They can be your sounding board while helping you analyze how grave the threat is.
- Preferred: Ask a trusted friend to accompany you as you investigate, record, report and block harassers.
- For serious situations: Hand your phone/accounts over to a trusted friend and ask them to summarize incoming messages and updates. Decreasing your exposure will decrease your stress.
- Bonus: Have the trusted friend start a group chat with you, them, and 2-3 additional people explicitly for your situation. This way, support work is distributed among multiple people.
We recommend either going through the recommendations below with your trusted friend or handing the recommendations over to them.
Another way to be less alone is to reach out to people who:
- Are close to you and will want to know because they care about you (friends and family).
- Might be second-hand impacted by the situation (colleagues, people in your professional or personal networks).
These people wonât necessarily be your âtrusted friend,â but they might be able to help with other things on the side.
If the situation escalates:
- Get ahead of any future trouble by making talking points together so that they know how to respond if internet strangers or the press contacts them.
- Find and notify someone in your community nearby with crisis experience for protection and support.
- Reach out to online (and offline) communities youâre an active member of and ask for help. See PEN Americaâs article on article on Deploying Your Supportive Cyber Communities.
- Share your story on Right To Beâs storytelling platform, where their âcommunity can help you document or report abuse on social media platforms, as well as send you messages of support.â
- Search for your name, nicknames, usernames, and address on Google, Bing, and other popular search engines. Try adding
filetype:pdf
to your search query to catch any CVs or documents you might have missed. - Run an image search on your most-used profile pictures on the same search engines.
- Search for your name, nicknames, and usernames on any social media platforms you regularly use. Check social media platforms that are popular where youâre located, too.
- Want to do a more thorough search? See Access Now Digital Security Helplineâs Self-Doxing Guide.
- Monitor your name and username. Add them as search keywords in the following tools:
- Monitor and archive webpages that mention you. Recommended tools:
- Log (date, time, description, screenshot, URL) incidents in whatever program/app is most accessible for you. If thereâs a lot of phone screenshots, use the Hunchly Mobile app to organize and annotate them.
- If future legal action is likely, pay Page Vault to capture a snapshot of a website. Ask a lawyer to file an evidence preservation request with the relevant online platform.
The following choices are not mutually exclusive, and the best choice may change over time as the situation evolves:
- Ignore: Sometimes, harassers will become bored and walk away if they donât get attention.
- De-escalate: In some contexts, you can defuse the situation with some calm words before it worsens.
- Mute on social media: This lets you have peace of mind and not have your harasserâs updates suddenly pop up on social media. (You might still want to check what theyâre saying proactively.)
- Block on social media: Sends a strong signal to your harasser. They wonât be able to see your posts or message you. They will, however, notice that you blocked them and might interpret it as a sign of escalation.
- Go public: Sometimes, shaming a harasser publicly or rallying people to your support will make them disappear. However, this has a high risk of escalating the situation and drawing more attention to it.
- Report: Report the harasser to the relevant online platform to have their account frozen or deleted. You may also report the incident to your local law enforcement if it makes sense.
- Lawyer up: If the harassment is clearly crossing legal boundaries in your jurisdiction, getting the help of a lawyer, might help, but make sure you have the time and money to do so.
See PEN America's Guidelines for Safely Practicing Counterspeech for extra tips on how to talk back effectively.
Sometimes you donât want to block an unwanted caller just yet. Sometimes a harasser uses fake/temporary numbers to call you. Here are some ways to manage unwanted calls:
- Silence or mute calls from a specific number:
- Android: Find the contact either in the Phone or Contacts app and tap on the name. Under
Contact settings
, go toContact ringtone â [Currently set sound] â None
. You can also send any calls directly to voicemail by tappingSend to voicemail
under the same contact settings. - iOS: Create a new
Focus Mode
by following these Tomâs Guide instructions.
- Android: Find the contact either in the Phone or Contacts app and tap on the name. Under
- Silence calls from all unknown numbers:
- iOS:
Settings â Apps â Phone â Silence Unknown Callers
- iOS:
- Block calls from all unknown numbers:
- Android:
- Reveal the number when a caller is hiding behind a
No Caller ID
setting by using an app like TrapCall.
- If harassment is happening on a social media platform: File a report with a social media company and ask at least 10 friends to do the same. Have 1â2 people file a copyright infringement claim if it makes sense.
- If thereâs harassment material on a website: File a report with the websiteâs web hosting service and domain registrar. You might be able to find out who these companies are by performing a WHOIS lookup on the website domain.
- If you contact law enforcement:
- Beware that not all officers are used to dealing with online harassment threats.
- If you believe you might become a target of swatting (where people prank call the cops on you), let them know ahead of time. Send them an article about swatting if itâs a new idea to them.
In most cases, you will be safer if you review and remove some of the public information that's out there online about. See the scenario below titled: Remove information about you off of the internet
.
Facebook has a few features to control your interactions, but ultimately relies on you setting limits on who can see and comment on your posts and profile.
- Ignore Messages within Facebook Messenger to move the current and future messages to the
Message Requests
section - Privacy Checkup within Facebook includes a section on
Who can see what you share
that walks you the visibiity of your profile and posts.
Instagram has a set of nuanced features within its mobile app to filter and fine-tune social interactions on its platform.
- Restrict an account, which means the other person canât see when youâre online, whether youâve read their messages, and hides their comments.
- Hide your stories from a specific account.
- Hidden Words filters out messages and comments with words that Instagram deems offensive. You can also set up a custom words list.
- Limit comments and messages from recent followers and accounts that arenât following you.
Bluesky lets anyone create their own manual or algorithmic label/mute/block list, and allows users to limit who gets to comment on/share their posts.
- There are two types of labels: badges and warnings. Badges are short, informative text labels that appear above a post or at the bottom of a profile. Warnings cover up the content with a warning about what it is, and forces you to click through to see the original post.
- Labeler accounts can be run by community members. By you subscribing to an account, you will then have access to the labels run by it. For each of the labels (e.g.
slur
), you get to choose whether you want the labeled post to be hidden, to have a badge next to it, to be warned about it, or to turn the label off for now. Here is a sample list of labeler accounts. - Moderation lists of users can be created by both user and labeler accounts in
Settings â Moderation â Moderation lists
. When you subscribe to one, you can choose to mute or block all users on the list. - Post interaction settings: Decide whether others can quote post, and only allow replies from mentioned users, followed users or nobody at all. When writing a post, tap
Anybody can interact
to see the settings.
Important caveat: Itâs currently possible to retrieve a list of everyone you block using the Bluesky API.
X no longer supports third-party tools that combat harassment, and the platformâs moderation efforts have gotten lax. If the controls below donât work, consider setting your profile to private and disengaging until the platform is stable again.
- See what lists youâve been added to by going to
Profile â Lists â ¡¡¡ â Lists
youâre on. If you see a suspicious list or list owner, tap the three dots on the top right to report the list and leave the list by blocking the creator. - Control who can reply to your tweets by tapping
Everyone can reply
and restricting it toPeople you follow
orOnly people you mention
.
TikTokâs efforts mostly center around protecting people from harmful comments.
- Add comment filters by entering manual keywords, by using TikTokâs own spam/offensive content filter, or by requiring manual approval on all of them.
- Add moderators to your livestream to help manage comments and block unwanted viewers.
- Remove followers from your account; former followers will not be notified.
Discord is centered around separate communities/servers, which affects the way blocking works.
- When you block someone:
- They are unable to direct message you, call you, or tag you in a post.
- Their messages to you disappear.
- Messages that they write on shared channels are hidden. But messages that you write on shared channels are still visible to them.
- They appear
offline
to you at all times, but they can still see your online/offline status.
- Privacy settings allow you to adjust whether community/server members can direct message you, and who's allowed to send you friend requests.
- Some platforms tell the other person you've blocked them, while others hide the action completely. Read this Consumer Reports guide for details on what blocking looks like to the other party.
- Donât worry if youâre not able to keep up with your regular workday routine.
- Call in friends to help share a meal, take a break, or watch your pet(s) for a few days.
- Do your best to eat and shower regularly.
- Engage in movement, no matter how small. That could be a walk or even stretching. Pick something you enjoy, and that eases your mind.
- Prepare a box of comforts beforehand. Include things you like to see, touch, taste, and listen to.
- If the incident is traumatizing, refer to it using a nickname.
- Remember, it is not your fault. Online harassment is never justified and is ignited for the most random reasons.
- Look up your local laws around ârevenge pornographyâ, ânonconsensual sharing of intimate images,â and âdigital sex crimes.â Know that in many places, it is a criminal act.
- Upload a garbled âhashâ of an abusive photo/video on StopNCII.org to have them removed from major platforms like Facebook, TikTok, and Reddit.
- Find where your face is being misused online using Alecto AI (beta). The service will also help with content removal.
- Connect with others and share your story on the My Image My Choice Storyplace.
- Connect with a local service from eSafetyâs global support list, Chaynâs global directory, or the Coalition Against Stalkerwareâs direct support resources.
- Take Bloomâs course on Image-based abuse and rebuilding ourselves.
- Make yourself a more challenging target. Consider making your social media accounts private (or temporarily deleting them) for 48 hours surrounding a major, new release.
- Donât make more noise about yourself. Donât livetweet your situation, donât quit your job suddenly, and donât talk to media outlets who will twist your words.
- If necessary, prepare a formal written statement or reply with the help of people who have experience dealing with the media.
- If the noise doesnât stop, flood the airwaves with positive stories about yourself. Ask people within your professional community to write positive articles or social media posts about you and your work.
- Remember, you did nothing wrong. Ignorant employers or colleagues may not be supportive and start seeing you as a liability â theyâre wrong.
- Read Lyz Lenzâs conversation with Talia Lavin about their experiences.
- Send these resources to your newsroom:
- Media Manipulation Casebook: Tips for Newsrooms to Support Journalists Targeted by Online Harassment
- Ontheline Newsrooms: Measures for Newsrooms and Journalists to Address Online Harassment.
- PEN America: Online Harassment Field Manual
- Games and Online Harassment Hotline: Digital Safety Guide
If youâre about to become a public figure or are experiencing harassment, consider the suggestions below.
You might not need to delete your entire account, but consider deleting (or making private) old posts or posts that reveal too much about where you live, where you go, and who youâre with.
- See what your public profile looks like, and remove/restrict things as you see fit.
- Desktop: go to your profile and click the đ button next to the right of the
Edit Profile
button. - Mobile: go to your profile, tap the three dots on the right of
Add Story
and tapView As
.
- Desktop: go to your profile and click the đ button next to the right of the
- Make it so only friends can see your past posts.
- Desktop: Go to
Settings â Privacy â Limit Past Posts
. - Mobile: Go to
Settings & Privacy â Settings â Privacy Settings â Limit who can see past posts
.
- Desktop: Go to
- Consider bulk deleting past posts. To delete multiple posts at once:
Settings and privacy â Activity log â Your Posts
and then select toArchive
orTrash
- Swipe to delete individual conversations.
- Delete chat content but keep the chat groups:
Settings â Chats â Clear All Chats
.
- Delete all chats, including the chat groups:
Settings â Chats â Delete All Chats
.
- Turn off chat backups on WhatsApp:
Settings â Chats â Chat backup
.
- Delete your previous backups. Instructions for:
- Look through your profile and manually delete posts. Tap the three dots in the upper-right corner of a photo.
- If you need to bulk-delete posts:
Your activity â Photos and videos â Posts
,Reels
orVideos â Select
and then choose eitherArchive
orDelete
- Manually locate and delete individual posts using its advanced search.
- Delete in bulk by using Cyd , TweetDelete or Tweet Deleter đ°.
- Login to your server through their website, and explore the options in
Preferences â Automated post deletion
.
- Modify your profileâs visibility settings. Make sure to limit
Who can see or download your email address
, andWho can see your connections
.
- Thereâs often no easy solution. Sometimes you have to delete your entire account.
- In the case of Reddit, you have to use third-party scripts because deleting your account still leaves your posts up.
Many social media companies let you restore your deleted account after a specific period. This can be useful if you want to hide for a while and wait for an event to pass.
- Facebook Read instructions to deactivate or delete your account temporarily. You have 30 days after deactivation to reverse it.
- Instagram Read instructions to disable your account temporarily, but deleting it seems permanent.
- X/Twitter Read instructions to deactivate your account. It will be permanently deleted if you donât log in after 30 days.
- Snapchat Read instructions to delete your account. It will be permanently deleted if you donât log in after 30 days.
Remember: Information removal requests takes time to process and often require repeated attempts.
- Ask Google and Bing and Bing to remove search results pointing to pages with your personal information on them.
- Remove any local business reviews youâve left on Google Maps, Yelp, etc. They might point to your home or frequently visited places.
- Follow the Cyber Civil Rights Initiativeâs guide to get policy-violating posts/media removed from social networks.
- If you want to do it yourself, check out Yael Grauerâs BADBOOL. (To be 100% thorough, use this on top of paid services.)
- If youâre willing to pay đ°, BADBOOL recommends using EasyOptOuts to remove your information from English-language public and paywalled sites.
- If you live in the US, Consumer Reportsâ Permission Slip app (iOS only) helps automate removal requests to 40+ US companies.
Note: The larger the publication, the harder it is to persuade them.
- Think of this as risk reduction, not total elimination. It will be impossible to have everything removed.
- Contact the editor or your previous contact. Explain your situation honestly and hope for a sympathetic editor/writer.
- If you think the editor/writer will not respond well, it may be better not to reach outâdoing so may draw more attention to your situation.
- For older articles, it may help to remind them that the article is still easily accessible on search engines.
- Enlist the help of a lawyer. Sometimes, the threat of legal action will persuade an unwilling editor.
- See the scenario:
Masking your identity for online dating, events, or organizing
. - Get a P.O. box at a post office or use Earth Class Mail (U.S. only) to hide your home address.
- If you live in the US, you might qualify for your home stateâs Address Confidentiality Program if you are a victim of abuse or a healthcare worker. Rules vary state by state.
- Delete old accounts to eliminate traces of personal information on the internet. Use the JustDeleteMe directory to accelerate this process.
When someone close to you (usually a romantic partner) spies on you using a hidden app on your mobile device, that person is using stalkerware.
- Keep a hidden, pen-and-paper log of suspicious incidents.
- Restart your phone every day while this is going on. Sometimes this forces spyware apps to stop working.
- Make sure your partner is not getting information from previously shared accounts. Did you share your calendar with them? Do you have any joint online accounts?
- Log in to your important accounts and look for any suspicious logged in sessions. Instructions for:
- Check to see if you set up location share on an app. Instructions for:
- Google Maps
- macOS: Find My
- If youâre an iPhone user, run Safety Check to review what youâve shared and with who:
Settings â Privacy & Security â Safety Check
- Scan for high-level spyware on your phone with iVerify. The appâs basic tier costs only $1 and allows you do submit a forensic scan once a month.
- Donât delete suspicious apps immediately. You may need to keep them as evidence. Plus, deletion may also cause the situation with your partner to escalate.
- Review and redo the items in
Levels 1â3
of this guide. Make sure to:- Reset your passwords for important accounts.
- Check your privacy settings.
- Look up any apps you donât recognize on your computer and phone.
- Make sure to look for hidden apps as well. Instructions for:
- iOS: On the home screen, keep swiping left until you get to the
App Library
screen. Scroll to the bottom to theHidden
group. Tap to open and unlock using Face ID or passcode. - Android: See all apps including hidden ones in
Settings â Apps â See all apps
- iOS: On the home screen, keep swiping left until you get to the
- Keep an eye out for other signs. Examples include:
- Your phone battery suddenly drains much faster than before.
- Your computer internet connection is slower than usual.
- You get emails/prompts about someone else logging into an account.
- Your partner suddenly asks to borrow your phone.
- Check to see if someone is using a tracking tile/tag to follow you. Luckily, the two most popular tracking tile/tags have anti-stalking features.
Donât go through this alone â seek help:
- Reach out to a trusted friend (through a public phone/line). Ask them to hold space for you and your situation. They can be your sounding board while helping you analyze how grave the threat is.
- Connect with one of the many organizations who specialize in stalkerware and domestic abuse (through a public/friend's phone/line). Some of them help you collect evidence and remove stalkerware safely.
- See the Coalition Against Stalkerware's global list of direct support organizations.
- Keep digital and printed records of relevant texts, emails, calls, etc.
- See NNEDV's guide on documenting/saving evidence.
- When you no longer need evidence, remove the suspicious apps/stalkerware yourself by performing a factory reset on your computer/phone. Buying a brand new device is even safer, of course.
- Remember to reinstall apps and import data manually, lest you restore a backup with stalkerware in it.
- Consumer Reports: Shut Stalkers Out of Your Tech
- Wirecutter: Protect Your Devices Against Domestic Abusers
- Apple iOS: Personal Safety User Guide: Keep yourself safe and your data private
Below are some general recommendations that all journalists and researchers should consider, especially for those working with (human) sources. If you have access to experts and training sessions through your workplace or professional communities, we highly recommend you taking advantage of that.
- To remotely wipe the contents of your devices. See scenario below titled:
Somebody took my phone/computer!
- To be on the receiving end of an email phishing campaign (as journalist emails are usually more public than others).
- Use email as little as possible. Even end-to-end encrypted email leaves a trail of metadata.
- Use an end-to-end encrypted messaging app that doesnât store metadata to exchange messages. Donât use X/Twitter DMs!
- For voice/video calls, use an end-to-end encrypted app as well.
- Use the security features in Signal and WhatsApp. See Martin Sheltonâs articles on Locking Down Signal and Upgrading WhatsApp security.
- To make anonymous tips easier, have your organization set up a Hush Line.
- For document transfers, have your organization set up SecureDrop. Failing that, encourage people to use OnionShare.
- Blur faces from photos and videos. Read the relevants recommendations in the scenario titled
Attending a protest
. - See Ted Han and Quinn Nortonâs Protecting Your Sources When Releasing Sensitive Documents.
- See Martin Sheltonâs Opening Secure Channels for Confidential Tips.
- Use a secondary phone number on messaging apps to talk to your sources.
- Create a public tip line using your secondary phone number. Follow Yael Grauerâs guide: How To Use Signal Without Giving Out Your Phone Number Using a Chromebook and an Old Phone.
- If you're traveling, review the scenario titled
Crossing an international border
. - If youâre covering a protest, review the scenario titled
Attending a protest
and decide which parts apply to you (if you have special journalist rights/protections where youâre working). - If you're doing research on social media, do so under a separate account that uses an alias (not your real name). Set up this account using a disposable email address. (Not all newsrooms/employers allow this, but push the allowed boundaries as much as possible.)
- Hide where youâre coming from to websites you visit. Use a VPN or Tor Browser, especially if youâre browsing the internet at home or at the office. You donât want website administrators to see that youâre visiting from the New York Times office network, for example.
Note: Courts can compel companies like Google to hand over all of your data.
- Use an email and storage provider not owned by an organization youâre reporting on.
- Move all of your work onto end-to-end encrypted platforms.
- Recommended email platforms: Proton Mail, Tuta Mail
- Recommended document/spreadsheet platform: CryptPad
- Recommended cloud storage platforms: Tresorit, Proton Drive
- Store sensitive data in a password-protected cloud or external storage device as much as possible. Read the relevant recommendations in our
Level 3
section above. - Permanently erase sensitive files from your computer. Recommended apps:
- macOS: CleanMyMac X (its file shredder feature is included in the free trial)
- Windows: Eraser for Windows
- Look for, lock or wipe your device remotely. Instructions for:
- iOS and macOS: Find My.
- Android: Find My Device.
- Windows: Find My Device
- Remove access to all important accounts on the lost device by logging into them from another device, and then logging out all other active sessions.
- Remove access to your authenticator app on the lost device (if you use an app that supports multiple devices).
- Instructions for:
- Ente Auth:
Settings â Security â View active sessions
, and then tap on one to terminate it. - Authy
- Ente Auth:
- Instructions for:
- Remove access to your password manager on the lost device in the same way.
- Instructions for:
- 1Password: Tap/click your profile icon/name, then
Manage Accounts â Accounts â [Your account name] â Trusted Devices and Browsers
, and chooseDeauthorize
on the lost device - Bitwarden:
Settings â My accounts â Deauthorize sessions
- 1Password: Tap/click your profile icon/name, then
- Instructions for:
- Change the password on important accounts (banking, email, social media) if you think someone else might misuse them.
- To prevent misuse, get a new SIM card and cancel your old one. Make sure to do this only after you've tried calling your phone to reach whoever has picked it up.
- If you get your device back, reset it back to its factory settings and restore it from your last backup.
- If the authorities seize your device at an international border crossing, ask for a seizure receipt (available in some jurisdictions, such as Canada).
-
Log in to your important accounts and look for any suspicious logged in sessions. Instructions for:
-
Use the device's built-in tools to look for irregular patterns.
- On your computer, look for any processes that are using a lot of your CPU, or have names that you don't recognize (look them up to be sure). Use these tools:
- macOS: Activity Monitor
- Windows: Process Explorer to look at what processes/applications are running. Google any suspicious names.
- On your phone, look for apps that are using an abnormally large amount of battery or data. Use these tools:
- iOS:
Settings â Battery â Battery usage by app
- iOS:
Settings â Cellular â Cellular data
- Android:
Settings â Battery â Battery usage
- Android:
Settings â Network and interent â SIMs â App data usage
- Android:
Settings â Network and interent â Internet â Non-operator data usage
- iOS:
- If you are on an iPhone:
- See if you can go to
Settings â General â Profiles
, and if itâs available, look for anything you donât recognize. - In Safari, enter the URL
videos://
. This should ask you to open the TV app if itâs working. Cancel that, and then type in a new URLcydia://
. It should say âSafari cannot open the page because the address is invalid.â
- See if you can go to
- On your computer, look for any processes that are using a lot of your CPU, or have names that you don't recognize (look them up to be sure). Use these tools:
-
Download third-party apps that analyze network connections and detect malware on your devices:
- Charles Proxy for Windows, macOS, Linux
- Glasswire for Windows, Android
- Little Snitch for macOS
- Objective-Seeâs tools for macOS
- iVerify for iOS, Android
-
Set up a spare phone as a room monitor to detect unwanted physical intrusion. Example apps:
-
Put your phone or tablet in âlockdown modeâ (iOS only) to block most of the incoming messages and connections while you figure things out:
- Read Apple Supportâs article about it.
Settings â Privacy & Security â Lockdown Mode â Turn On Lockdown Mode
These typically fall into several categories:
- For residents of a country or jurisdiction: Run an internet search for local internet associations and NGOs.
- For victims of gender-based violence: See Chaynâs global directory, the Coalition Against Stalkerwareâs direct support resources, and eSafetyâs global support list.
- For members of civil society: See Amnesty International Security Labâs list of digital resilience and security helplines and helpdesks.
- See Consumer Reports Security Plannersâ list of instructions on regaining access.
- See Microsoftâs list of government fraud and scam reporting websites (scroll down to "What to do if you already paid").
- Drop a News Tip has a list of 50+ news organizations from all over the world that let you submit information through SecureDrop and/or an end-to-end encrypted messaging app.
This section contains additional tools and tips that we encountered during our research. Many of the recommendations below are popular with members of the cybersecurity community, but we found them to be a little too hard to use/follow, or too specific for a small group of people.
- Write and take notes on end-to-end encrypted apps. Instead of Google Docs or Microsoft Office, use CryptPad or Standard Notes. Both are open-source and free to use.
- Share files anonymously with Tresorit Send or OnionShare.
- Turn suspicious PDFs into safe ones using Dangerzone.
- Edit your
Protected View
settings (Windows only) if you open a lot of files in Microsoft Office and Adobe Acrobat. - Try a new end-to-end encrypted messaging app. Itâs always good to have more than one installed in case it has a server outage. See Mark Williamsâ Secure Messaging Apps Comparison for some options.
- Send end-to-end encrypted emails using Proton Mail or Tuta Mail.
- Find an end-to-end encrypted video calling service using Freedom of the Press' guide.
- Send a self-destructing, password-protected message using One Time.
- Sign up to be notified by Have I Been Pwned when an account tied to your email is compromised.
- Scan for any Bluetooth devices near you (including AirTags) with nRF Connect.
- Increase the protective barriers around your accounts:
- Googleâs Advanced Protection program for Google accounts/apps and Android phones. This is especially useful if your most-used and most-private account belongs to Google (including Gmail).
- Proton Sentinel đ° for Proton services/apps.
- US residents: freeze your credit to prevent bad actors from accessing or mis-using your personal information. See IntelTechniquesâ Credit Freeze Guide for details.
- Buy a USB YubiKey for two-factor authentication. If you work in free speech/press/internet, you may qualify for a free Yubico for Free Speech.
- Use 1Passwordâs Travel Mode to create a set of passwords you donât take with you on the road.
- Put your smart cards/passports/phones in a Faraday bag that blocks signals from going in and out. (See Micah Leeâs guide on them.)
- Buy a microphone blocker from Mic-Lock to plug into your phone to mute its microphone.
- Get a security-focused router from pcWRT or Peplink.
- Buy a hardware-encrypted external USB or hard drive from companies like Apricorn.
- Use a specialized DNS service to access the internet like Quad9.
- Use a decentralized, private messaging app powered by the Tor network. Check out Ricohet Refresh.
- Access Facebook with more anonymity and bypass internet filtering by using its onion service.
- Use a more secure operating system for your computer. Options include:
- Harden your Android phone to be more secure and private:
- Use F-Droid: an open source, security-focused app store.
- Replace the operating system your phone came with:
- If you have a Google phone, install GrapheneOS or CalyxOS.
- If you donât have a Google phone, install a vanilla âstockâ version of Android directly from Google and without all the extras your phone manufacturer added. (Instructions vary depending on what phone you have, so you will have to do some research.)
- Start using super secure devices. Options include:
- Read this EDRi guide on ethical website development and maintenance. Pay special attention to its privacy recommendations.
- Protect your website from DDOS attacks and other threats by using
- Deflect. Thereâs a free plan for non-profits.
- Cloudflare. Thereâs a free plan for arts, human rights, civil society, journalism, or democracy organizations.
- Project Shield from Google. Only available for news, human rights and election monitoring sites.
- If using WordPress, consider using the following plugins
- Wordfence
- Sucuri Security
- If your hosting service doesn't offer backups, use VaultPress or BackupBuddy.
- Alternatively, use Simply Static to turn your public-facing Wordpress site into a static site.
- Use a privacy-oriented analytics service like Matomo or Koko Analytics.
- Consider switching to a more privacy-oriented hosting service like Greenhost or Maadix .
- Set up a security.txt file so that researchers have a place to disclose security vulnerabilities.
- Set up a robots.txt file using this ai.robots.txt list to prevent AI companies from crawling and scraping your data.
đ Oh my, you have arrived.
đ This is the end.
đ Thank you for reading.
đ Thank you for being thorough.
đ You are a true champ.
We consulted many sources and drew upon our experiences in creating this guide. If youâre not finding quite what you want here, we recommend checking out the following resources:
- Consumer Reports: Security Planner
- Electronic Frontier Foundation: Surveillance Self-Defense
- Michael Horowitz: A Defensive Computing Checklist
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Special thanks to our GitHub contributors and community members who wrote in with edits, suggestions and translations.