For quick reference, we've created a handy guide designed to be printed, folded, and carried in your pocket (PDF download). Now, more than ever, citizens must be able to hold those in power ...
Phones can get viruses and other kinds of malware (malicious software ), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...
This page was translated from English. The English version may be more up-to-date. As with most chat apps, communications can be made between either individuals or a group, allowing you to send end-to ...
This page was translated from English. The English version may be more up-to-date. This is an overview of network censorship, but it is not comprehensive. There are different ways of beating internet ...
If you plan to send a secure message to someone who uses public key cryptography like PGP , you need to know what key to use to encrypt your message. Public key servers act as a phonebook for such ...
Digital fingerprinting is the process where a remote site or service gathers little bits of information about a user's machine, and puts those pieces together to form a unique picture, or "fingerprint ...
This page was translated from English. The English version may be more up-to-date. We've updated this guide to a new page. Please see the new version here. Signal is ...
This page was translated from English. The English version may be more up-to-date. We've updated this guide to a new page. Please see the new version here. Signal is ...
Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong. The more you understand it, the safer you will be against such situations. We ...