AnonymousVideo

Surveillance Self-Defense # Civil Liberties in the Digital World

Surveillance Self-Defense

Sunday 1 February 2015

Who is this guide for?

Surveillance Self-Defense (SSD) is a guide to protecting yourself from electronic surveillance for people all over the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at an audience with considerable technical expertise and privacy/security trainers. We believe that everyone’s threat model is unique—from activists in China to journalists in Europe to the LGBTQ community in Uganda. We believe that everyone has something to protect, whether it’s from the government or parents or prying employers, stalkers, data-mining corporations, or an abusive partner.

What is this guide meant to do?

There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step tutorials for installing and using a variety of privacy and security tools, but also aims to teach people how to think about online privacy and security in a sophisticated way that empowers them to choose appropriate tools and practices even as the tools and adversaries change around them. Please note that the law and technology can change quickly, and portions of SSD may become out of date.

This guide acknowledges that some especially powerful and sophisticated threats may be difficult or impossible to protect oneself against. We hope that this guide teaches users to be skeptical of sweeping claims that any particular tool offers complete security or privacy. Strong privacy and security practices are still worthwhile even if they are not guaranteed to be effective 100% of the time against every adversary. These practices increase the cost and effort of surveillance—and they may increase it to the point where an adversary feels that surveilling you is no longer worthwhile.

What are the limitations of this guide?

This guide does not address operational security or "OPSEC" in the broader sense. OPSEC is the process of protecting information about one’s activities that may be important to a potential adversary. This is a process that frequently goes beyond the digital realm.

For example, people trying to have confidential meetings may have to worry about whether someone physically followed them, or whether they were observed by CCTV cameras, or whether their neighbors might have become aware of the meeting, or whether their meeting places have been bugged. Perhaps they should wonder if they are creating a suspicious pattern of activity. They may also have physical security concerns; could they tell if someone broke into their home or tampered with their laptop? Are their confidential documents safe?

These are important and valid concerns for people with certain kinds of security needs, but they fall outside the scope of this guide.

Please use SSD as a starting point for your own research, and check for more recent facts, cases and authorities. Please note that, even if a statement made about the law is accurate, it may only be accurate in one jurisdiction (place); as well, the law may have changed, been modified or overturned by subsequent development since the entry was made. The materials in SSD are for informational purposes only and not for the purpose of providing legal advice. You should contact a lawyer licensed to practice in your jurisdiction to obtain advice with respect to any particular issue or problem.

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server

Tor

Socks5

Hostname

Port

SSL

CyberGuerrilla 9050 6dvj6v5imhny3anf.onion 6697

Welcome to Radio Vendetta Podcasts.

Autonomous Anonymous Network

NordVPN is an excellent VPN for online privacy

Warning – Numerous VPN service providers assure not to keep users’ log files of their connections and it is generally false! Many VPN services that promise anonymity for (...)


eelo - mobile OS and associated web-services

eelo - mobile OS and associated web-services

Your data is YOUR data! eelo in short. eelo recognises the need shared by everyone for better data privacy. The eelo project will provide an alternative mobile operating (...)


A secret British spy unit has waged war on the hacktivists

34c3 - Ethics, Society & Politics - Chaos Computer Club.Uncovering British spies’ web of sockpuppet social media personas. A secret British spy unit created to mount cyber (...)


With Love and Hope, The Riseup Collective

With Love and Hope, The Riseup Collective

There is a war being fought over your communication. One side wants control, so they can profit from and watch everything you say and do online. They want to sell you stuff, (...)


Join the resistance

Tor hidden-service - IRC.CyberGuerrilla

Tor Socks5: 9050 - Host: 6dvj6v5imhny3anf.onion - Port: 6697 - SSL
Webchat #OpNewBlood
Tor protects your privacy - Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely
Tor Browser
Tor Browser
Tor protects your privacy
NordVPN
NordVPN
Protect your privacy

Secure your Internet Connection.

Read more Close