{"id":18278,"date":"2019-12-22T13:23:10","date_gmt":"2019-12-22T18:23:10","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=18278"},"modified":"2019-12-22T13:24:08","modified_gmt":"2019-12-22T18:24:08","slug":"tips-tools-and-how-tos-for-safer-online-communications","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/tips-tools-and-how-tos-for-safer-online-communications\/","title":{"rendered":"Tips, Tools and How-tos for Safer Online Communications"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">Tips, Tools, and How-tos for Safer Online Communications<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13950 alignleft\" src=\"https:\/\/www.thundercloud.net\/infoave\/new\/wp-content\/uploads\/2017\/11\/safe.png\" alt=\"Cloudeight Keeping YOU Safe!\" width=\"160\" height=\"177\" \/>For years, we&#8217;ve been consistent in our approach to helping you stay safe online. We&#8217;ve tried to impress upon you that there isn&#8217;t any software that will protect you from everything and no software in the world that will protect you from yourself. Security software should be your safety net &#8211;not your main line of defense.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">And for years we&#8217;ve tried hard to prepare you for the worst while helping you enjoy your time online. We have never wanted or tried to scare you away from all the best the Internet has to offer. The Internet is a great resource, the greatest resource humankind has ever known. <\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>There are two things we don&#8217;t want you to be: <\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Paranoid and afraid. <\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>And there are two things we want you to be: <\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Prepared and alert.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">There is no better way to be prepared than by continuing to educate yourself. The Internet is a gold mine of excellent information &#8211; and it&#8217;s also a huge garbage pit teeming with misinformation. And we know very well that sometimes it&#8217;s a difficult task to separate the rind from the fruit &#8212; to know what&#8217;s true and what&#8217;s not and to know who to trust and who not to trust. But when you think about it, it&#8217;s no different on the Internet than it is in real life.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">One of the organizations that we trust is The Electronic Frontier Foundation. They are a non-profit watchdog agency looking out for all of us netizens.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The Electronic Frontier Foundation recently published the most comprehensive guide on online surveillance, your privacy and how to stay safe online we&#8217;ve ever seen. It covers a wide range of topics. Some parts will not apply to you. If you only read the topics that interest you, you&#8217;ll be wiser and safer than you are right now. And that&#8217;s exactly why we&#8217;re telling you about it today. We want to help keep you safe so you can enjoy your time online.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">We hope you find this guide useful.<\/span><\/p>\n<p>&nbsp;<\/p>\n<header class=\"large-12 columns large-centered text-center\">\n<div class=\"site-name\">\n<blockquote><p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>SURVEILLANCE SELF-DEFENSE<\/strong><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>TIPS, TOOLS AND HOW-TOS FOR SAFER ONLINE COMMUNICATIONS<\/strong><\/span><\/p><\/blockquote>\n<\/div>\n<\/header>\n<blockquote>\n<section class=\"main-section\">\n<div class=\"panel-display panel-1col clearfix\">\n<div class=\"panel-panel panel-col\">\n<div>\n<div class=\"panel-pane pane-panels-mini pane-front-page-overview-section\">\n<div class=\"pane-content\">\n<div id=\"mini-panel-front_page_overview_section\" class=\"panel-display panel-1col clearfix\">\n<div class=\"panel-panel panel-col\">\n<div>\n<div class=\"panel-pane pane-node\">\n<div class=\"pane-content\">\n<div id=\"node-70\" class=\"container node node-page view-mode-full clearfix\">\n<div class=\"content\">\n<div class=\"body field\">\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">We\u2019re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Read the\u00a0<a href=\"https:\/\/ssd.eff.org\/module-categories\/basics\">BASICS<\/a>\u00a0to find out how online surveillance works. Dive into our\u00a0<a href=\"https:\/\/ssd.eff.org\/module-categories\/tool-guides\">TOOL GUIDES<\/a>\u00a0for instructions to installing our pick of the best, most secure applications. We have more detailed information in our\u00a0<a href=\"https:\/\/ssd.eff.org\/module-categories\/further-learning\">FURTHER LEARNING<\/a>\u00a0sections. If you\u2019d like a guided tour, look for our list of common\u00a0<a href=\"https:\/\/ssd.eff.org\/module-categories\/security-scenarios\">SECURITY SCENARIOS<\/a>.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Basics<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Animated Overview: How to Make a Super-Secure Password Using Dice<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Animated Overview: Protecting Your Device From Hackers<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Animated Overview: Using Password Managers to Stay Safe Online<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Choosing Your Tools<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Communicating with Others<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Creating Strong Passwords<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Keeping Your Data Safe<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Seven Steps To Digital Security<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">What Should I Know About Encryption?<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Why Metadata Matters<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Your Security Plan<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Tool Guides<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Avoid Phishing Attacks<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Circumvent Online Censorship<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Delete your Data Securely on Linux<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Delete Your Data Securely on macOS<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Delete Your Data Securely on Windows<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Enable Two-factor Authentication<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Encrypt Your iPhone<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Encrypt Your Windows Device<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use KeePassXC<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use OTR for macOS<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use OTR on Linux<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use PGP for Linux<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use PGP for macOS<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use PGP for Windows<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use Signal for Android<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use Signal on iOS<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use Tor for Linux<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use Tor for Windows<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use Tor on macOS<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use WhatsApp on Android<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How to: Use WhatsApp on iOS<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Further Learning<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Attending a Protest<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Choosing the VPN That&#8217;s Right for You<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Facebook Groups: Reducing Risks<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How Do I Protect Myself Against Malware?<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Key Concepts in Encryption<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Key Verification<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Protecting Yourself on Social Networks<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The Problem with Mobile Phones<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Things to Consider When Crossing the U.S. Border<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/ssd.eff.org\/en\" target=\"_blank\" rel=\"noopener noreferrer\">Please take some time to read this comprehensive guide<\/a><\/strong><\/span> published by the Electronic Frontier Foundation. We promise &#8212; it will be time well spent.<\/span><\/p>\n<p>&nbsp;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Tips, Tools, and How-tos for Safer Online Communications For years, we&#8217;ve been consistent in our approach to helping you stay safe online. We&#8217;ve tried to impress upon you that there isn&#8217;t any software that will protect you from everything and no software in the world that will protect you from yourself. Security software should be your\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/tips-tools-and-how-tos-for-safer-online-communications\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":14573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[151,1683,1433,2883,1678,1669,1,3472,2942,3590,1670,1682,1680,1656,1674,3602],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/18278"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=18278"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/18278\/revisions"}],"predecessor-version":[{"id":18281,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/18278\/revisions\/18281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/14573"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=18278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=18278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=18278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}