ssd.eff.org Open in urlscan Pro
2a04:4e42:200::201  Public Scan

Submitted URL: http://ssd.eff.org/
Effective URL: https://ssd.eff.org/
Submission: On November 24 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

GET /search

<form autocomplete="off" action="/search" accept-charset="UTF-8" method="get">
  <label class="sr-only" for="q"><span class="translation_missing" title="translation missing: en.layouts.application.keywords">Keywords</span></label>
  <input type="text" name="q" id="q">
  <button>Search</button>
</form>

GET /search

<form autocomplete="off" action="/search" accept-charset="UTF-8" method="get">
  <label class="sr-only" for="q"><span class="translation_missing" title="translation missing: en.layouts.application.keywords">Keywords</span></label>
  <input type="text" name="q" id="q" value="" class="hide">
  <button>Search</button>
</form>

Text Content

Skip to main content
 * About
 * Language
   * English
   * አማርኛ
   * العربية
   * Español
   * Français
   * Русский
   * Türkçe
   * Tiếng Việt
   * Português
   * Mandarin
   * Burmese
   * پښتو
   * ภาษาไทย
   * اردو
   * More Translations
 * Index
 * Keywords Search

×
 * About
 * Language
   * English
   * አማርኛ
   * العربية
   * Español
   * Français
   * Русский
   * Türkçe
   * Tiếng Việt
   * Português
   * Mandarin
   * Burmese
   * پښتو
   * ภาษาไทย
   * اردو
   * More Translations
 * Index
 * Keywords Search

ssd.eff.org ≡
Surveillance
Self-Defense
Tips, Tools and How-tos for Safer Online Communications
A Project of the Electronic Frontier Foundation

We’re the Electronic Frontier Foundation, an independent non-profit working to
protect online privacy for over thirty years. This is Surveillance Self-Defense:
our expert guide to protecting you and your friends from online spying.

Read the BASICS to find out how online surveillance works. Dive into our TOOL
GUIDES for instructions to installing our pick of the best, most secure
applications. We have more detailed information in our FURTHER LEARNING
sections. If you’d like a guided tour, look for our list of common SECURITY
SCENARIOS.


 * BASICS
   
   All of our Starter Resources in One Place


 * TOOL GUIDES
   
   Software that Protects Privacy


 * SECURITY SCENARIOS
   
   For a Specific Situation or Security Plan


POPULAR GUIDES

 * Your Security Plan
 * Attending a Protest
 * How to: Enable Two-factor Authentication
 * How to: Detect Bluetooth Trackers
 * How to: Use WhatsApp
 * How to: Use Signal

See All Guides


BASICS

 * Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance
 * Animated Overview: How to Make a Super-Secure Password Using Dice
 * Animated Overview: Protecting Your Device From Hackers
 * Animated Overview: Using Password Managers to Stay Safe Online
 * Choosing Your Tools
 * Communicating With Others
 * Creating Strong Passwords
 * Keeping Your Data Safe
 * Seven Steps To Digital Security
 * What Should I Know About Encryption?
 * Why Communication Metadata Matters
 * Your Security Plan


TOOL GUIDES

 * How to: Avoid Phishing Attacks
 * How to: Delete Your Data Securely on Windows
 * How to: Delete Your Data Securely on macOS
 * How to: Delete your Data Securely on Linux
 * How to: Detect Bluetooth Trackers
 * How to: Enable Lockdown Mode on iPhone
 * How to: Enable Two-factor Authentication
 * How to: Encrypt Your Windows, Mac, or Linux Computer
 * How to: Encrypt Your iPhone
 * How to: Understand and Circumvent Network Censorship
 * How to: Use Signal
 * How to: Use Tor for Linux
 * How to: Use Tor for Windows
 * How to: Use Tor for macOS
 * How to: Use Tor on Android and iPhone
 * How to: Use WhatsApp


FURTHER LEARNING

 * A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems
   Work?
 * Attending a Protest
 * Choosing a Password Manager
 * Choosing the VPN That's Right for You
 * Facebook Groups: Reducing Risks
 * How Do I Protect Myself Against Malware?
 * Key Concepts in Encryption
 * Key Verification
 * Privacy Breakdown of Mobile Phones
 * Privacy for Students
 * Protecting Yourself on Social Networks
 * Things to Consider When Crossing the U.S. Border
 * What Is Fingerprinting?


SECURITY SCENARIOS

 * Abortion Access Activist, Worker, or Patient
 * Academic researcher?
 * Activist or protester?
 * Human rights defender?
 * Journalism student?
 * Journalist on the move?
 * LGBTQ Youth?
 * Online security veteran?
 * Want a security starter pack?

Surveillance
Self-Defense
 * About
 * Index
 * Glossary
 * Credits
 * Donate

 * Copyright (CC BY)
 * Privacy