June 19, 2021


travel is natural.

Surveillance Self-Protection and Security Training: Yr in Assessment 2020

As the world fast adjusted in 2020, new threats arose to our digital security. The shift to online schooling and the wave of law enforcement brutality protests introduced new avenues for surveillance, so EFF created new resources to support men and women protect by themselves.

EFF maintains a repository of self-assist assets for preventing again versus surveillance across a selection of distinct platforms, devices, and danger products. We get in touch with it Surveillance Self-Defense, or SSD for brief. 

SSD addresses myriad matters, and is broken up into 4 key sections:

  • Fundamentals: Overviews on what electronic surveillance is and how you can fight it.
  • Software Guides: Action-by-stage tutorials on putting in and employing privacy and stability equipment.
  • Additional Understanding: Deep-dives on the idea driving protecting your digital privateness.
  • Safety Situations: Playlists of our methods for specific use instances.

In 2017, we also introduced the Security Instruction Companion, also known as SEC, as a sister web site to SSD. It is geared towards people today who would like to assist their communities discover about digital safety, but are new to the art of stability coaching.

SEC also capabilities 4 principal spots of educational means:

  • Safety Education 101: Content on foundational educating concepts, and the logistics and issues of arranging a workshop or teaching.
  • Lesson Modules: Guides for training learners how to use password professionals or lock down their social media, and more.
  • Educating Elements: Handouts and gifs to enable illustrate new concepts in approachable techniques for any ability stage.
  • Protection Information: An archive of curated EFF Deeplinks posts for trainers, technologists, and educators who educate digital safety.

Main Updates to SSD and SEC in 2020

Privateness for Pupils

Our university student privacy guidebook is a broad-ranging breakdown of the means educational facilities spy on college students, both of those in and out of the classroom. It goes around the varieties of systems educational facilities can use and the details that they can obtain, with techniques that college students can use to safeguard by themselves and their friends from invasive school surveillance.

Knowing and Circumventing Network Censorship

We revamped and renamed our previous censorship circumvention guide to split down more entirely the methods in which censorship and surveillance go hand-in-hand, and the harms they deliver to customers. We also go around how network censorship happens–where the blocking happens, and by what mechanisms. And finally, the guideline delivers customers with alternatives for circumvention tactics, and the hazards and added benefits of these selections.

Attending a Protest

Our guidebook on attending protests went by way of a significant update in reaction to the protests from police brutality this earlier summer months. We extra new sections on dressing for anonymity and safety to circumvent surveillance methods employed at protests and criteria for transit, area, and social media monitoring. We also presented extra means to support deal with issues of self-censorship in the encounter of surveillance possibility and steering on publishing photographs in a aware way to decrease exposing other protesters to likely hurt.

Lesson Module: Phishing and Malware 

We additional to SEC’s training repertoire this 12 months by building a lesson module on educating other people about phishing and malware. This resource is primarily based firmly in learner empowerment, not dread. These subjects can be complicated and terrifying for folks just mastering how to shield by themselves on the web, and we body this training in setting up up learners’ recognition and being familiar with, not recommending precise instruments. An more useful resource produced in tandem with this lesson is our malware handout, a double-sided enlightening useful resource on the popular forms of malware, and protections from contracting this destructive application on equipment.

Check out the rest of Surveillance Self-Defense to understand far more about protecting oneself online, and Safety Education and learning Companion for far more of our digital protection training resources, at the beginner and intermediate levels of studying.

This posting is element of our Year in Review series. Read through other content about the fight for electronic rights in 2020.

You may have missed