Digital Security Guide

Your phone is a tracking device. Your messages aren't private. Your data is for sale. Here's how to fight back and protect yourself.

001 โ€” THREAT MODELING

Know What You're Protecting Against

"Security" isn't one-size-fits-all. A casual activist needs different protections than an organizer working with undocumented communities. Before you act, think about your specific risks.

Ask Yourself:

What do I have that's worth protecting? Contact lists, communications, location data, photos, organizational plans?

Who might want to access it? Law enforcement, employers, stalkers, political opponents, hackers, data brokers?

What are the consequences if they do? Embarrassment, job loss, legal trouble, deportation, physical danger?

How likely is each threat? Focus your energy on the most probable and most dangerous scenarios.

TIER 1

Everyone Should Do This

Basic hygiene. Low effort, high impact.

๐Ÿ”

Use a Password Manager

Unique, strong passwords for every account. Bitwarden is free and open source. 1Password is excellent.

Essential
๐Ÿ“ฑ

Enable Two-Factor Authentication

Use an authenticator app (not SMS). Authy or Google Authenticator work well. Enable on email first.

Essential
๐Ÿ”’

Lock Your Phone Properly

Use a 6+ digit PIN, not biometrics (cops can force your thumb, not your memory). Enable auto-lock after 30 seconds.

Essential
๐Ÿ’ฌ

Use Signal for Sensitive Messages

End-to-end encrypted messaging. Enable disappearing messages. Signal is free and trusted by security researchers worldwide.

Essential
๐Ÿ”„

Keep Everything Updated

Software updates often patch security holes. Enable automatic updates on all devices.

Essential
TIER 2

Active Organizers

If you're coordinating actions or working with vulnerable communities.

๐ŸŒ

Use a VPN

Encrypts your internet traffic and hides your IP. Mullvad or ProtonVPN are trusted, privacy-focused options.

Recommended
๐Ÿ“ง

Encrypted Email

ProtonMail or Tutanota for sensitive communications. Regular email is a postcardโ€”anyone handling it can read it.

Recommended
๐Ÿ’ป

Full Disk Encryption

If your laptop is lost or seized, encryption protects everything on it. Enable FileVault (Mac) or BitLocker (Windows).

Recommended
๐Ÿ”

Privacy-Focused Browser

Firefox with uBlock Origin, or Brave. Avoid Chromeโ€”it's a Google surveillance tool.

Recommended
๐Ÿ“

Disable Location Services

Turn off location for all apps that don't absolutely need it. Your location history is a map of your life.

Recommended
TIER 3

High-Risk Situations

Journalists, legal observers, those facing serious threats.

๐Ÿง…

Tor Browser

Routes traffic through multiple servers to anonymize your browsing. Essential for researching sensitive topics.

Advanced
๐Ÿ–ฅ๏ธ

Tails OS

A portable operating system that leaves no trace. Boots from USB, routes everything through Tor.

Advanced
๐Ÿ“ฑ

Burner Phone

For protests or sensitive meetings. Prepaid, purchased with cash, never connected to your identity.

Advanced
๐Ÿ”‘

Hardware Security Keys

YubiKey or similar for unphishable 2FA on critical accounts. The gold standard in account protection.

Advanced
"Arguing that you don't care about privacy because you have nothing to hide is like saying you don't care about free speech because you have nothing to say."
002 โ€” SCENARIOS

Security for Specific Situations

๐Ÿ“ฃ Going to a Protest

Your phone is a tracking device and a potential source of evidence. Prepare before you go.

BEFORE:
  • Back up your phone, then consider leaving it home or using a burner
  • If bringing your phone: disable Face ID/Touch ID, use a long PIN
  • Turn off location services and Bluetooth
  • Enable airplane mode if you don't need cell service
  • Write emergency contact numbers on your arm in marker
DURING:
  • Don't post real-time location or photos that could identify others
  • If recording, blur faces before sharing
  • Use Signal for any necessary communications

๐Ÿ›‚ Crossing a Border

At borders, your normal rights are significantly reduced. Devices can be searched without a warrant.

PROTECT YOURSELF:
  • Travel with a clean device if possibleโ€”no sensitive data
  • Back up and wipe your phone before crossing; restore after
  • Log out of all apps and social media
  • If you must carry data, ensure full disk encryption
  • Know that you can refuse to unlock, but there may be consequences

๐Ÿ  Protecting Your Home Network

Your home network is a vulnerability. Anyone on it can potentially see your traffic.

ESSENTIALS:
  • Change your router's default admin password
  • Use WPA3 encryption (or WPA2 if WPA3 isn't available)
  • Create a guest network for IoT devices and visitors
  • Consider a VPN at the router level for whole-home protection
  • Disable remote management features

๐Ÿ”Ž If You're Being Surveilled

Signs include: accounts being accessed from unknown locations, devices behaving strangely, or people knowing things they shouldn't.

IMMEDIATE STEPS:
  • Don't tip off the surveillerโ€”act normally while you plan
  • Check login locations on all major accounts
  • Scan devices for stalkerware (Lookout, Malwarebytes)
  • Consider that physical devices may be compromised
  • Contact digital security organizations like EFF or Access Now

โš ๏ธ Security Is a Team Sport

Your security is only as strong as the weakest link in your network. If you're using Signal but your contacts aren't, your messages are still exposed on their end. If you're careful but your organization stores data insecurely, you're all vulnerable. Build a culture of security together.

Quick Security Audit

Accounts

I use a password manager with unique passwords for each account

I have 2FA enabled on email, social media, and banking

I've checked which apps have access to my accounts and revoked unused ones

Devices

My phone uses a PIN (not just biometrics) and auto-locks quickly

My computer has full disk encryption enabled

All my devices have automatic updates enabled

Communications

I use Signal for sensitive conversations

I have disappearing messages enabled on Signal

I'm careful about what I share over unencrypted channels

Privacy

I've reviewed and restricted location services on my phone

I use a privacy-focused browser (Firefox/Brave) with an ad blocker

I've opted out of data brokers (DeleteMe or manual opt-outs)

003 โ€” RESOURCES

Learn More

Electronic Frontier Foundation (EFF) โ€” eff.org/issues/privacy โ€” Surveillance self-defense guides and digital rights advocacy.

Access Now Digital Security Helpline โ€” accessnow.org/help โ€” Free, direct assistance for activists, journalists, and human rights defenders.

Security in a Box โ€” securityinabox.org โ€” Comprehensive digital security guides for activists worldwide.

Freedom of the Press Foundation โ€” freedom.press โ€” Security resources specifically for journalists and sources.

Security Is Freedom

You can't organize effectively if you're being watched. Protect yourself so you can protect democracy.

Take Action โ†’