What happens if you lose access to a secret key, or it stops being secret? A revocation certificate is a file that you can generate that announces that you no longer trust that key. You generate it ...
This page was translated from English. The English version may be more up-to-date. This is an overview of network censorship, but it is not comprehensive. There are different ways of beating internet ...
This page was translated from English. The English version may be more up-to-date. If used correctly, end-to-end encryption can help protect the contents of your messages, text, and even files from ...
It wasn’t long ago that spying was a labor-intensive job, requiring excessive resources and specific targets. These days, it has gotten much easier for governments or adversaries to spy on individuals ...
This page was translated from English. The English version may be more up-to-date. As with most chat apps, communications can be made between either individuals or a group, allowing you to send end-to ...
A passive adversary is one that can listen to your communications, but cannot directly tamper with them. Surveillance Self-Defense About Index Glossary Credits Donate ...
A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are ...
አብዛኛውን ጊዜ ትላልቅ ተቋማት እና ኩባንያዎች ከራሳቸው የውስጥ አውታረ መረብ የሚገኙ አገልግሎቶችን (ለምሳሌ የኢሜል፣ የድር፣ እና የሰነዶች እና ...
Phones can get viruses and other kinds of malware (malicious software), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...