Privacy Guide v01
Privacy Guide v01
Introduction
This document contains a list of resources that may be of use to individuals who hope to
increase the relative privacy of their online communications. The author makes no claims of
expertise, and assumes no liability for the use (or misuse) of any information contained herein.
This document will begin with a series of List of Concepts in order to introduce readers to
basic concepts. After the concepts have been introduced, this document will turn toward
providing a handful of more in-depth sources.
List of Concepts
TOR: A network that routes internet traffic through many anonymized servers in order to
increase privacy. TORs TOR Browser is a pre-configured web browser that the organization
recommends for most users.
URL: https://www.torproject.org/download/download.html
PGP: Stands for Pretty Good Privacy-- one of the more popular techniques for encrypting
networked communications. Similar encryption schemes like GnuPG are also available noncommercially.
URL: https://ssd.eff.org/en/glossary/pgp
Signal: An encrypted mobile messaging service. For use in protecting the contents of SMS/text
messages.
URL: https://whispersystems.org/
VPN: Stands for Virtual Private Network. Obscures the location of internet traffic.
URL: http://www.meta-activism.org/2013/12/an-activists-guide-to-vpn-services/
TAILS: A security-oriented operating system that users can run from a USB stick. Often
recommended for use in tandem with other tactics in order to further reduce the likelihood of
unexpected data compromises.
URL: https://tails.boum.org/index.en.html
2-Factor Authentication: A tactic that requires users to provide more than one form of
authentication (e.g. both password and PIN) in order to access resources. Supported by most
widely-used online services and therefore one of the easiest ways to improve security.
URL: https://en.wikipedia.org/wiki/Multi-factor_authentication
In-Depth Guides
Best Practices for Conducting Risky Research and Protecting Yourself From Online
Harassment
Accessibility: Very accessible
Alice Marwick (Data & Society), Lindsay Blackwell (U. Michigan), Katherine Lo (UC-Irvine)
This white paper outlines several steps that internet users can take to minimize their
experience of online harassment. Many tactics discussed require very few technical skills.
Because of its high accessibility, this guide should be of interest to nearly anybody with a faint
interest in online safety. Includes links to organizations that support individuals experiencing
crises and acute threats.
URL: http://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct2016.pdf
URL: https://epic.org/privacy/tools.html