📋
Operational security for activists
  • Home - Operational security for activists
  • Mobile phone security
  • Secure digital communication
  • Email, online banking, and social media security
  • Running a pseudonymous social media account
  • WiFi security
  • Virtual Private Networks (VPNs) and Tor
  • Editing images for security
  • Laptop security
  • How the government tracks your location
  • Talking to journalists
  • Glossary
  • Further reading
Powered by GitBook
On this page

Home - Operational security for activists

This is a short book that describes how activists can stay safe when using technology or attending protests. Many of the tips in this book were written for people that are being threatened by law enforcement, large corporations, or organized crime.

Table of contents

Mobile phone securitySecure digital communicationEmail, online banking, and social media securityRunning a pseudonymous social media accountWiFi securityVirtual Private Networks (VPNs) and TorEditing images for securityLaptop securityHow the government tracks your locationTalking to journalistsGlossaryFurther reading
NextMobile phone security

Last updated 3 years ago