Purpose
It is the intent of this repository to inform and instruct users wanting to protect themselves from prying
eyes when communicating day to day. Each walkthrough is framed in a way that tells you upfront what data of
yours is at risk, how it's collected, and how it can be exploited.
Those looking to contribute:
- Present the content in small digestible portions
- Walkthroughs should have the following sections:
- The action (email, sms, sending a file, sharing a password)
- How's the information vulnerable? How is it exploited?
- How to protect yourself
- [Optional] The technical details
Tools
Account Security
E-Mail
- Thunderbird + Enigmail
- Keybase.io
- [Proton Mail](./walkthroughs/Proton Mail.md)
Mobile Messaging
Researching
Files
- Metadata stripping
- SpiderOak
- Onion Share
- GPG w/password
Diving Deeper
Upcoming Walkthroughs
- Setting Up a GPG Key
- Using someone else's key to encrypt a message
- Unencrypting a message someone sent you
- Configuring Thunderbird
- Protecting against MITM (man in the middle) attacks