Essential tools, guides, and resources for understanding and defending against digital surveillance
Essential steps for digital privacy
Identify tracking technologies
Secure your smartphone
5-part documentary series
MIT Technology Review • 2024
Stanford Research • 2024
Harvard Business • 2023
Annual surveillance rankings
Unique physical characteristics used for identification (fingerprints, facial features, iris patterns)
Closed-Circuit Television - video surveillance systems in public and private spaces
Companies that collect and sell personal information from various sources
Virtual boundaries that trigger actions when devices enter or exit designated areas
Collection of information from entire populations rather than specific individuals
System that rates citizens based on behavior and restricts access to services
Trail of data created by online activities and digital interactions
Data about data - information about when, where, and how communications occur
Security vulnerability unknown to software developers, exploited by attackers
No single tool provides complete protection. Digital privacy requires a layered approach combining multiple tools and practices.
Evaluate your personal threat level
Use multiple protection methods
Technology changes rapidly