html> Protect Yourself - State of Surveillance

⚠️ Important Disclaimer

We do not endorse any particular service or company mentioned in these guides. Any service located within reach of an adversary (government or corporation) is likely to be compromised or compelled to cooperate through secret orders, legal demands, or technical attacks. These guides are for educational purposes onlyβ€”always research current best practices and make your own informed decisions.

Essential Privacy Tools & Techniques

🌐

Browser Privacy

Configure your browser to resist tracking, fingerprinting, and surveillance. Essential privacy extensions and settings.

Read Guide
πŸ“±

Encrypted Messaging

Secure communications with Signal, Element, and other encrypted messaging apps. OPSEC for sensitive conversations.

Read Guide
πŸ“§

Email Security

Migrate to secure email providers, configure encryption, and protect your email from surveillance.

Read Guide
πŸ”’

VPN Strategy

Choose and use VPNs effectively while understanding their limitations. Jurisdiction, logging, and trust considerations.

Read Guide
πŸ–₯️

Secure Operating Systems

Privacy-focused operating systems: Tails, Whonix, Qubes, and hardening existing systems.

Read Guide
πŸ”

Tor Browser Guide

Use Tor safely for anonymous browsing, circumventing censorship, and protecting your identity online.

Read Guide
οΏ½

Search Privacy

Stop search engines from tracking your queries and building behavioral profiles. Privacy-focused alternatives.

Read Guide
🌐

DNS Security

Prevent your ISP from tracking every website you visit. Configure DNS-over-HTTPS and privacy-focused resolvers.

Read Guide
πŸ“±

App Permissions

Audit and control what data your mobile and desktop apps can access. Minimize surveillance through apps.

Read Guide
🚫

Data Broker Opt-Outs

Remove your information from data collection and people search sites that sell your personal data.

Read Guide
🏠

Digital Compartmentalization

Separate your digital activities into isolated compartments to prevent data correlation and limit breach impact.

Read Guide
πŸ•΅οΈ

OPSEC Basics

Operational security fundamentals to protect your activities and maintain privacy against sophisticated threats.

Read Guide
πŸ“±

Mobile Device Security

Comprehensive mobile privacy: secure operating systems, app auditing, and protecting against mobile surveillance.

Read Guide
πŸ”

Data Encryption

Protect your files, communications, and data with strong encryption techniques and best practices.

Read Guide

Quick Start Guides

πŸš€ Immediate Privacy Wins

Steps you can take right now to improve your privacy in 15 minutes or less.

πŸ“‹ Privacy Roadmap

A comprehensive roadmap to improve your privacy step by step.

⚠️ Threat Assessment

How to assess your specific risks and choose appropriate protection strategies.

πŸ”„ Data Minimization

Reducing your digital footprint and minimizing data collection about you.

🚨 Critical Security Reminders

  • No tool is perfect: Every security tool has limitations and potential vulnerabilities
  • Jurisdiction matters: Consider where companies are based and what laws they must follow
  • Threat models vary: What works for one person may be inappropriate for another
  • Stay updated: Security landscapes change rapidlyβ€”what's secure today may be compromised tomorrow
  • Operational security: Your behavior and practices matter more than any specific tool

πŸ’‘ Start with the Basics

Don't be overwhelmed by all these options. Start with the Privacy Roadmap for a step-by-step approach, or dive into Immediate Privacy Wins for quick improvements you can make today.