0% found this document useful (0 votes)
259 views4 pages

Privacy Guide v01

Basics of privacy, for beginners.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
259 views4 pages

Privacy Guide v01

Basics of privacy, for beginners.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Introductory Resources for Internet Privacy

Introduction
This document contains a list of resources that may be of use to individuals who hope to
increase the relative privacy of their online communications. The author makes no claims of
expertise, and assumes no liability for the use (or misuse) of any information contained herein.
This document will begin with a series of List of Concepts in order to introduce readers to
basic concepts. After the concepts have been introduced, this document will turn toward
providing a handful of more in-depth sources.

List of Concepts
TOR: A network that routes internet traffic through many anonymized servers in order to
increase privacy. TORs TOR Browser is a pre-configured web browser that the organization
recommends for most users.

URL: https://www.torproject.org/download/download.html

PGP: Stands for Pretty Good Privacy-- one of the more popular techniques for encrypting
networked communications. Similar encryption schemes like GnuPG are also available noncommercially.

URL: https://ssd.eff.org/en/glossary/pgp

URL: https://ssd.eff.org/en/module/how-use-pgp-mac-os-x (for Mac users)

URL: https://ssd.eff.org/en/module/how-use-pgp-windows (Windows)

Signal: An encrypted mobile messaging service. For use in protecting the contents of SMS/text

messages.

URL: https://whispersystems.org/

VPN: Stands for Virtual Private Network. Obscures the location of internet traffic.

URL: http://www.meta-activism.org/2013/12/an-activists-guide-to-vpn-services/

TAILS: A security-oriented operating system that users can run from a USB stick. Often
recommended for use in tandem with other tactics in order to further reduce the likelihood of
unexpected data compromises.

URL: https://tails.boum.org/index.en.html

2-Factor Authentication: A tactic that requires users to provide more than one form of
authentication (e.g. both password and PIN) in order to access resources. Supported by most
widely-used online services and therefore one of the easiest ways to improve security.

URL: https://en.wikipedia.org/wiki/Multi-factor_authentication

In-Depth Guides
Best Practices for Conducting Risky Research and Protecting Yourself From Online
Harassment
Accessibility: Very accessible
Alice Marwick (Data & Society), Lindsay Blackwell (U. Michigan), Katherine Lo (UC-Irvine)
This white paper outlines several steps that internet users can take to minimize their
experience of online harassment. Many tactics discussed require very few technical skills.
Because of its high accessibility, this guide should be of interest to nearly anybody with a faint

interest in online safety. Includes links to organizations that support individuals experiencing
crises and acute threats.
URL: http://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct2016.pdf

Surveillance Self-Defense Guides


Accessibility: Beginner/intermediate
Electronic Frontier Foundation
A library of tutorials targeting both novice and experienced users. Material of particular interest
include overviews of general security, encryption, and password creation. More intermediate
topics include use of encrypted communication techniques, including PGP, Signal, KeePass, and
TOR.
URL: https://ssd.eff.org/

Guide to Practical Privacy Tools


Accessibility: Intermediate
Electronic Privacy Information Center
A list of links to useful privacy tools, including more advanced tools than discussed by the sites
above. Tools discussed include VPNs and Proxies, web browser add-ons, security-oriented
email, disk encryption, firewalls, antivirus software, meshnets, document sharing, and-- most
importantly-- mobile security. Mobile security is under-examined in many sources, so the links
included here are of particular interest.

URL: https://epic.org/privacy/tools.html

Jolly Rogers Security Guide for Beginners


Accessibility: Intermediate
Written for an audience of darknet market users, this guide covers some topics less wellcovered above. These topics include cryptocurrencies like BitCoin, use of darknet markets (e.g.
Silk Road), and interactions with law enforcement. This document was produced for more
transgressive purposes than the documents above and should be regarded with the appropriate
caution.
URL: https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/

RiseUp Security Resources list


Accessibility: Intermediate/Advanced
RiseUp is a provider of online communication tools dedicated specifically to serving the
needs of activist communities. Their guide to privacy resources assumes a deeper existing
knowledge of computing than many others listed above, but addresses several free/open source
tools that may be of interest.
URL: https://riseup.net/en/security/resources

You might also like