Surveillance Self-Defense # Civil Liberties in the Digital World

Surveillance Self-Defense

Sunday 1 February 2015

Who is this guide for?

Surveillance Self-Defense (SSD) is a guide to protecting yourself from electronic surveillance for people all over the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at an audience with considerable technical expertise and privacy/security trainers. We believe that everyone’s threat model is unique—from activists in China to journalists in Europe to the LGBTQ community in Uganda. We believe that everyone has something to protect, whether it’s from the government or parents or prying employers, stalkers, data-mining corporations, or an abusive partner.

What is this guide meant to do?

There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step tutorials for installing and using a variety of privacy and security tools, but also aims to teach people how to think about online privacy and security in a sophisticated way that empowers them to choose appropriate tools and practices even as the tools and adversaries change around them. Please note that the law and technology can change quickly, and portions of SSD may become out of date.

This guide acknowledges that some especially powerful and sophisticated threats may be difficult or impossible to protect oneself against. We hope that this guide teaches users to be skeptical of sweeping claims that any particular tool offers complete security or privacy. Strong privacy and security practices are still worthwhile even if they are not guaranteed to be effective 100% of the time against every adversary. These practices increase the cost and effort of surveillance—and they may increase it to the point where an adversary feels that surveilling you is no longer worthwhile.

What are the limitations of this guide?

This guide does not address operational security or "OPSEC" in the broader sense. OPSEC is the process of protecting information about one’s activities that may be important to a potential adversary. This is a process that frequently goes beyond the digital realm.

For example, people trying to have confidential meetings may have to worry about whether someone physically followed them, or whether they were observed by CCTV cameras, or whether their neighbors might have become aware of the meeting, or whether their meeting places have been bugged. Perhaps they should wonder if they are creating a suspicious pattern of activity. They may also have physical security concerns; could they tell if someone broke into their home or tampered with their laptop? Are their confidential documents safe?

These are important and valid concerns for people with certain kinds of security needs, but they fall outside the scope of this guide.

Please use SSD as a starting point for your own research, and check for more recent facts, cases and authorities. Please note that, even if a statement made about the law is accurate, it may only be accurate in one jurisdiction (place); as well, the law may have changed, been modified or overturned by subsequent development since the entry was made. The materials in SSD are for informational purposes only and not for the purpose of providing legal advice. You should contact a lawyer licensed to practice in your jurisdiction to obtain advice with respect to any particular issue or problem.

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server

Tor

Socks5

Hostname

Port

SSL

CyberGuerrilla 9050 epynixtbonxn4odv34z4eqnlamnpuwfz6uwmsamcqd62si7cbix5hqad.onion 6697
NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

3-Year Plan | Discount -70%
NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

3-Year Plan | Discount -70%
Security Alert: Sextortion is on the rise

Security Alert: Sextortion is on the rise

Security Alert: Lucrative Scam of Sextortion Is on the Rise. January 21, 2019. The latest report from cybersecurity company Symantec shows that extortion scams are on the (...)


Why the NordVPN network is safe

Why the NordVPN network is safe

Why the NordVPN network is safe after a third-party provider breach. Information has recently surfaced about a NordVPN breach caused by vulnerabilities in a third-party (...)


Riseup - Radical tech collective

Riseup - Radical tech collective

Support the friendly, radical, tech collective that supports you. This email is the first of several in Riseup’s fall fundraising drive, where every donation carries other (...)


Tails - donation campaign for 2019

Tails - donation campaign for 2019

Tails-news: donation campaign for 2019 begins today. Every day, Tails helps thousands of people to safely use their computers online and offline. Tails is available for (...)


WikiLeaks

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.


Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
3-Year Plan | Discount -70%

Anonymous T-Shirts
Anonymous T-Shirts