Start protecting your security and privacy in the age of mass surveillance with how-to guides and resources. Want to learn more? Reach out to set up a training workshop with our digital security experts.
In this guide, we walk you through verifying the legitimacy of an open source software package before installation. As the old adage goes, "Check yo sigs before you wreck yo gigs."
From the EFF
Take a crash course in some of the tools you can use to analyze, manipulate, and scrub media metadata.
The browser extension Mailvelope provides users with a simple and accessible introduction to email encryption.
So, you’ve been arrested at an event. You’re taken to the police station and your phone is confiscated. When you’re let out, you realize someone has gone through your digital belongings. What now?
From song lyrics to rolling dice, here's a quick reference guide for making it easier to choose a safe passphrase based on the devices and applications you're using.
A Virtual Private Network (VPN) is an essential tool for protecting your online activity. Figuring out which VPN to use and finding security among the snake oil can be a challenge. This guide will show you what to look for when shopping for a VPN.
An FPF Graphic
Need to bring your phone to a protest, but worried it may be confiscated? Our infographic lists eight steps you can take to secure your mobile phone before you walk out the door.
An FPF Graphic
While attending an organized action, your mobile device is at risk of being tampered with by authorities. You can minimize the consequences of a mobile phone confiscation by following the steps in our visual guide.
An FPF Guide
Concerned about the privacy and security of your communications? Follow our guide to locking down Signal.
An FPF Series
For media makers working in film, journalism, and the arts, data protection is essential. Learn how you can use encryption to build up your defenses, and protect your work.
An FPF Series
DiskUtility, available exclusively on macOS machines, is optimized to create encrypted spaces on both your computer and external storage devices.
Request Training Information
We offer in-person training on various privacy and security tools for media organizations and individual journalists. If you're interested in getting some help, please put in a request through this form.
As password breaches become more frequent, learning how to protect online accounts is more important than ever.
Imagine if every combination lock required the same combination to unlock. To get ...
Want to liven up any party? Come bearing gifts. While everyone else is giving traditional, physical gifts, we’ll be giving something much more exciting to our friends and family ...