This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications

Skip to main content

Surveillance
Self-Defense Tips, Tools and How-tos for Safer Online Communications A Project of the Electronic Frontier Foundation

We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying.

Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.

New to Security?

All of our Starter Resources in One Place

Tool Guides

Software that Protects Privacy

Teaching Security to Others?

Check out our Security Education Companion

Popular Guides

Creating Strong Passwords Assessing Your Risks Protecting Yourself on Social Networks How to: Use Signal on iOS How to: Use Signal for Android How to: Enable Two-factor Authentication See all guides >

Basics

Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance Animated Overview: How to Make a Super-Secure Password Using Dice Animated Overview: Protecting Your Device From Hackers Animated Overview: Using Password Managers to Stay Safe Online Assessing Your Risks Choosing Your Tools Communicating with Others Creating Strong Passwords Keeping Your Data Safe Seven Steps To Digital Security What Should I Know About Encryption? Why Metadata Matters

Tool Guides

How to: Avoid Phishing Attacks How to: Circumvent Online Censorship How to: Delete your Data Securely on Linux How to: Delete Your Data Securely on macOS How to: Delete Your Data Securely on Windows How to: Enable Two-factor Authentication How to: Encrypt Your iPhone How to: Encrypt Your Windows Device How to: Use KeePassXC How to: Use OTR for macOS How to: Use OTR on Linux How to: Use PGP for Linux How to: Use PGP for macOS How to: Use PGP for Windows How to: Use Signal for Android How to: Use Signal on iOS How to: Use Tor for Linux How to: Use Tor for Windows How to: Use Tor on macOS How to: Use WhatsApp on Android How to: Use WhatsApp on iOS

Further Learning

A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work? Attending Protests (International) Attending Protests (United States) Choosing the VPN That's Right for You Facebook Groups: Reducing Risks How Do I Protect Myself Against Malware? Key Concepts in Encryption Key Verification Protecting Yourself on Social Networks The Problem with Mobile Phones Things to Consider When Crossing the U.S. Border

Security Scenarios

Academic researcher? Activist or protester? Human rights defender? Journalism student? Journalist on the move? LGBTQ Youth? Mac user? Online security veteran? Want a security starter pack?
JavaScript license information