📋
Operational security for activists
  • Home - Operational security for activists
  • Mobile phone security
  • Secure digital communication
  • Email, online banking, and social media security
  • Running a pseudonymous social media account
  • WiFi security
  • Virtual Private Networks (VPNs) and Tor
  • Editing images for security
  • Laptop security
  • How the government tracks your location
  • Talking to journalists
  • Glossary
  • Further reading
Powered by GitBook
On this page

Home - Operational security for activists

NextMobile phone security

Last updated 3 years ago

This is a short book that describes how activists can stay safe when using technology or attending protests. Many of the tips in this book were written for people that are being threatened by law enforcement, large corporations, or organized crime.

Table of contents

Mobile phone security
Secure digital communication
Email, online banking, and social media security
Running a pseudonymous social media account
WiFi security
Virtual Private Networks (VPNs) and Tor
Editing images for security
Laptop security
How the government tracks your location
Talking to journalists
Glossary
Further reading