General Tips for (Digital) Security
accessnow: Digital Security Tips for Russia and Belarus
Systemli: Tips for more secure communication
RiseUp: Digital Security
Digital First Aid Kit
Security in a box. digital security tools and tactics
Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications
Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.
All of Network Freedom's instructions in one post
Police is trying to seize the phone - what to do? They came with a search - how to protect your equipment? What to do if they check the phones at the border? How to protect personal accounts from hacking? What to do if your account was attacked by bots? How do I protect myself from having my channel hacked? How do I collect photo and video evidence under adverse conditions? How to create an encrypted folder on your computer? How to prepare for an internet blackout? What to do if the Internet does get cut off?
#WAKE UP: Action Safety Leaflet
Network / VPN / Browsing
VPN | Teplitsa: Which VPN to use. What to choose when everything is blocked?
AmneziaVPN: free access to media and NGOs blocked in Russia
VPN | AirVPN
A VPN based on OpenVPN and operated by activists and hacktivists in defence of net neutrality, privacy and against censorship.
VPN | Mullvad VPN
You have a right to privacy In a society increasingly determined to erode that right, a fast, trustworthy and easy-to-use VPN is a good first step toward reclaiming it.
VPN | Psiphon
VPN & Proxy | AntiBan
Browse Privately. Explore Freely. Defend yourself against tracking and surveillance. Circumvent censorship
Mobile | Orbot
free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
There are many discussions on the Tor Mailing list and spread over many forums about combining Tor with a VPN, SSH and/or a proxy in different variations. X in this article stands for, "either a VPN, SSH or proxy". All different ways to combine Tor with X have different pros and cons.
How to read resources blocked by the Russian authorities. Meduza's simple instructions
What to do if the Internet is cut off?
DOXA and Roskomswoboda Guide
Department One: How to protect yourself from wiretaps and communication hacking
7 tips to secure group chats
Messenger | Signal
Messenger | Support Service: How to use Telegram (relatively) safely
Messenger | How law enforcement agencies find Telegram users and how to avoid it
E-mail | PGP encryption in thunderbird
Secure mailbox provider | RiseUp
Secure mailbox provider | systemli
Secure mailbox provider | protonmail
Online Meetings | systemli meet
Secure conference call | Mumble
Mobile | LineageOS Android Distribution
A free and open-source operating system for various devices, based on the Android mobile platform
Tails: Portable operating system that protects against surveillance and censorship
KeePassXC - Cross-Platform Password Manager
Device Control by the Police
How to prepare devices for transportation across the border?
Inspection of the phone on the street: how to prepare?
Committee Against Torture: What to do if police officers order you to unlock your phone.
More and more often, police officers stop people on the street or in the subway and tell them to show their phones in order to see their social networks and photos. Let's find out if law enforcement officers really have the right to do this
Network Freedoms: What if your smartphone falls into the hands of intruders? And if they also demand a password?
RoskomSvoboda: At the border they rewrite the IMEI of the phone. What for and what to do with it?
Surveillance & CCTV
OVD-Info: Recognition of protesters by video cameras
How does it happen, what happens, and is it even possible to do it that way?
Privacy International: FREE TO PROTEST. The Protestor's Guide To Police Surveillance And How To Avoid It
From page 8 on: How facial recognition technology can be used at a protest and how you can try to maintain your anonymity.
How to Survive a Federal Manhunt
You are being observed. What to do?
How surveillance works and how to protect yourself and your loved ones from it.
Vyvozhuk: How do you detect surveillance and escape from it?
Vyvozhuk: STOP BUYING TICKETS. How You're Being Spied on by the Secret Service
Media Partisans: How not to get caught putting up flyers or creating graffiti
Tips for camouflage at protests/events
How to disable a surveillance camera
Using cab services safely
In the new version of the bill "On the organization of passenger transportation," cab services are required to provide "automated remote access" to their data to the FSB.
How to delete information about yourself from social networks
How not to go to jail for a repost?