Skip to content
View Featured Image

Surveillance Self-Defense: Year In Review 2019

Above Photo: From Eff.org

Here at EFF, we maintain a repository of self-help resources on circumventing surveillance across a variety of different platforms, devices, and threat models. We call it Surveillance Self-Defense, or SSD for short.

SSD covers myriad topics, and is broken up into four main sections:

  • Basics: Overviews on what digital surveillance is and how you can fight it. And if you don’t understand a term being used, there’s an extensive glossary at your disposal.
  • Tool Guides: Step-by-step tutorials on installing and using privacy and security tools.
  • Further Learning: Deep-dives on the theory behind protecting your digital privacy and common ways to apply it.
  • Security Scenarios: Playlists of our resources for specific use cases, such as LGBTQ youth, journalists, activists, and more.

Things to Note About SSD

Always. Be. Updating.
SSD is audited and updated on a rolling basis, as new information comes to light or instructions are no longer relevant or useful. Our team of security and surveillance experts review each piece to make sure we’re giving you the most up-to-date information we’re able. Each guide has a “Last reviewed” date at the beginning that lets you know how recently that guide was evaluated, so you can make informed choices about your digital security.

Security speaks more than one language
This resource is translated from English in whole or in part into 10 languages: AmharicArabicSpanishFrenchRussianTurkishVietnameseBrazilian PortugueseThai, and Urdu (as well as additional, externally-hosted community translations in Indonesian Bahasa, Burmese, Traditional Chinese, Igbo, Khmer, Swahili, Yoruba, and Twi.

Note: Since the English language site is the source material, it’s important to compare the “Last reviewed” date at the beginning of each translated guide to the English version for the most up-to-date version.

Major Updates this Year

Facebook Groups: Reducing Risks
One major change in Facebook’s groups’ settings was a change in visibility—group administrators no longer have the option to choose secret, private, or public groups. Instead, when administrators create a group, they can choose between only two privacy settings: private or public. In addition to choosing between public and private, they can also choose between “hidden in search” and “visible in search”—in other words, whether or not the group will turn up if someone searches for it or related topics on Facebook. In our guide on reducing risks, we detail the things to consider when creating, joining, or administering a Facebook group for a sensitive topic or vulnerable community.

How to: Use Tor on macOS, Windows, and Linux
Our set of guides for using the Tor browser on macOSWindows, and Linux were given a major overhaul to account for the brand new UI/UX that Tor rolled out earlier this year. The tutorials on installing and using Tor across these three operating systems have been updated with fresh screenshots for each step of the installation process. As with all our tool guides, we link directly to the official download site so you can trust that you’re getting an authentic copy of the software over a secure connection.

Choosing the VPN That’s Right for You
Our guide to choosing a VPN has been expanded to provide explanations in greater depth on how VPNs work, what they do, and what they don’t do. We also cover considerations for evaluating which VPN is right for you, and how those considerations can be affected by location, law, and the needs you may have around data collection, privacy, and security.

Key Verification
Our guide on key verification when using end-to-end encryption has been massively expanded, updated, and now includes graphics. These visual explainers help break down the concepts, risks, and associated strategies for mitigating those risks when verifying keys. New guide sections include the various ways to verify keys out of band, and verification aids such as keyservers.

Attending Protests
Our guide on attending protests has been streamlined to apply to a wider international audience, with some specific information relevant to protesting in the United States. We discuss best practices for encrypting your devices and protecting your data, installation of the end-to-end encrypted messenger Signal, the disabling of biometric unlock functions for your devices, and considerations for photo metadata and device confiscation.

Check out the rest of Surveillance Self-Defense to learn more about protecting yourself online. And if you’re interested in helping your friends and neighbors understand digital security, our sister resource, Security Education Companion (SEC), is full of lessons and educational materials at the beginner and intermediate levels of learning.

Urgent End Of Year Fundraising Campaign

Online donations are back! Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Urgent End Of Year Fundraising Campaign

Online donations are back! 

Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Sign Up To Our Daily Digest

Independent media outlets are being suppressed and dropped by corporations like Google, Facebook and Twitter. Sign up for our daily email digest before it’s too late so you don’t miss the latest movement news.