Surveillance Self-Defense

Surveillance Self-Defense

Sunday 1 February 2015

Who is this guide for?

Surveillance Self-Defense (SSD) is a guide to protecting yourself from electronic surveillance for people all over the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at an audience with considerable technical expertise and privacy/security trainers. We believe that everyone’s threat model is unique—from activists in China to journalists in Europe to the LGBTQ community in Uganda. We believe that everyone has something to protect, whether it’s from the government or parents or prying employers, stalkers, data-mining corporations, or an abusive partner.

What is this guide meant to do?

There are many privacy and security guides on the Internet that teach users to use a specific set of tools, such as password safes or VPNs or the Tor Browser Bundle. SSD includes step-by-step tutorials for installing and using a variety of privacy and security tools, but also aims to teach people how to think about online privacy and security in a sophisticated way that empowers them to choose appropriate tools and practices even as the tools and adversaries change around them. Please note that the law and technology can change quickly, and portions of SSD may become out of date.

This guide acknowledges that some especially powerful and sophisticated threats may be difficult or impossible to protect oneself against. We hope that this guide teaches users to be skeptical of sweeping claims that any particular tool offers complete security or privacy. Strong privacy and security practices are still worthwhile even if they are not guaranteed to be effective 100% of the time against every adversary. These practices increase the cost and effort of surveillance—and they may increase it to the point where an adversary feels that surveilling you is no longer worthwhile.

What are the limitations of this guide?

This guide does not address operational security or "OPSEC" in the broader sense. OPSEC is the process of protecting information about one’s activities that may be important to a potential adversary. This is a process that frequently goes beyond the digital realm.

For example, people trying to have confidential meetings may have to worry about whether someone physically followed them, or whether they were observed by CCTV cameras, or whether their neighbors might have become aware of the meeting, or whether their meeting places have been bugged. Perhaps they should wonder if they are creating a suspicious pattern of activity. They may also have physical security concerns; could they tell if someone broke into their home or tampered with their laptop? Are their confidential documents safe?

These are important and valid concerns for people with certain kinds of security needs, but they fall outside the scope of this guide.

Please use SSD as a starting point for your own research, and check for more recent facts, cases and authorities. Please note that, even if a statement made about the law is accurate, it may only be accurate in one jurisdiction (place); as well, the law may have changed, been modified or overturned by subsequent development since the entry was made. The materials in SSD are for informational purposes only and not for the purpose of providing legal advice. You should contact a lawyer licensed to practice in your jurisdiction to obtain advice with respect to any particular issue or problem.


Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%
Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%

Translation

Security Alert: Sextortion is on the rise

Security Alert: Sextortion is on the rise

Security Alert: Lucrative Scam of Sextortion Is on the Rise. January 21, 2019. The latest report from cybersecurity company Symantec shows that (...)


UbuCon Europe - Paris 2017

UbuCon Europe - Paris 2017

The ’libre’ and open source event of the year 2017. 8th to 10th September. Cité des sciences et de l’industrie. Parc de la Villette, Paris, France. (...)


Three challenges for the web, according to its inventor

Three challenges for the web, according to its inventor

Today is the world wide web’s 28th birthday. Here’s a message from our founder and web inventor Sir Tim Berners-Lee on how the web has evolved, (...)


Tor protects your privacy

Tor protects your privacy

Tor protects our privacy and identity on the Internet. We’ve gotten very used to the Internet. We are constantly sharing information about (...)


With Love and Hope, The Riseup Collective

With Love and Hope, The Riseup Collective

There is a war being fought over your communication. One side wants control, so they can profit from and watch everything you say and do online. (...)


Stop Censorship Machine

Stop Censorship Machine

EU copyright threatens our freedoms #SavetheMeme. Xnet launches video campaign “Stop #CensorshipMachine” to defend our rights and freedom of (...)


WikiLeaks

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.


/e/ Foundation
eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
2-Year Plan | Discount -72%