Privacy Guides is a cybersecurity resources and privacy-focused tools to protect yourself online.
Start your privacy journey here. Learn why privacy matters, the difference between Privacy, Secrecy, Anonymity and Security and how to determine what is the threat model that corresponds best to your needs.
For example, here are some examples of threats. You may want to protect from some but don’t care much about others.
- Anonymity – Shielding your online activity from your real identity, protecting you from people who are trying to uncover your identity specifically.
- Targeted Attacks – Being protected from hackers or other malicious actors who are trying to gain access to your data or devices specifically.
- Passive Attacks – Being protected from things like malware, data breaches, and other attacks that are made against many people at once.
- Service Providers – Protecting your data from service providers (e.g. with E2EE, which renders your data unreadable to the server).
- Mass Surveillance – Protection from government agencies, organisations, websites, and services which work together to track your activities.
- Surveillance Capitalism – Protecting yourself from big advertising networks, like Google and Facebook, as well as a myriad of other third-party data collectors.
- Public Exposure – Limiting the information about you that is accessible online—to search engines or the general public.
- Censorship – Avoiding censored access to information or being censored yourself when speaking online.
Here, you can read about Privacy Guides recommendations for a whole range of online privacy tools, from browsers to service providers (cloud storage, email services, email aliasing services, payment, hosting, photo management, VPNs etc), softwares (sync, data redaction, encryption, files sharing, authentication tools, password managers, productivity tools, communication such as messaging platforms etc) and operating systems.
You can also understand some common misconceptions about online privacy (think: “VPN makes my browsing more secure”, “open source is always secure” or “complicated is better” amongst others).
You can also find valuable information about account creation: what happens when you create an account, understanding Terms of Services and Privacy Policies, how to secure an account (password managers, authentication software, email aliases etc). And just as important (maybe more), about account deletion (we leave A LOT of traces in the course of our digital life, and it’s important to become aware of what they are and how to reduce their number).
AND MUCH MORE!
I can’t recommend this website enough. Visit it, revisit it, bookmark it and share it with friends and enemies. 🙂
Leave a Reply