Here is a collection of resources from Oh Shit! What Now?’s October 2018 class, “Computer Security For Activists & Everyone.” We either used these resources and links in the creation of the class, or they offer opportunities for further learning and study.
Current Events: Facebook & Google+ Hacked
- The Facebook Hack Exposes An Internet-Wide Failure (WIRED)
- Facebook Hack Explained (CNBC)
- Google is shutting down Google+ for consumers following security lapse (The Verge)
Current Events: Feds Use FaceID To Unlock Phone
- Why Cops Can Force You To Unlock Your Phone With Your Face (WIRED)
- Police Can Force You To Use Fingerprint To Unlock Your Phone (The Atlantic)
Apps
- BurnerApp, for creating disposable phone numbers
- Cloudflare Encrypted DNS, may be an important addition to your VPN
- DuckDuckGo, a search engine which doesn’t track you
- Have I Been Pwned? search if your online accounts were compromised in major security breaches
- LastPass, the most popular password keeper (for better or worse)
- Signal, from Open Whisper Systems (search for it in your app store), for secure encrypted messaging & phone calls
- Tor Browser, makes it harder to trace & track your online activity
Videos
- Cybersecurity For The People: How To Protect Yourself At A Protest, a short, informative video on protecting yourself at a protest from The Intercept
- What Vault 7 Means for You & How to Protect Yourself With Encryption, a video guide (with transcript) from Oh Shit! What Now! collective member Kit O’Connell, written for Act Out!
Further Reading
- A DIY Guide to Feminist Cybersecurity, another take on online security form a feminist perspective
- A 70-Day Web Security Action Plan for Artists and Activists Under Siege, a step by step plan for getting more secure
- Communications Security from Riseup.net, don’t be the weak link in your activist plans
- Crash Override Network, resources to prevent doxing or deal with being doxed
- CryptoParty, a great security guide especially if you want to teach others and make it fun
- How to run a rogue government Twitter account with an anonymous email address and a burner phone, skills that will apply to many anonymous behaviors online
- How Secure Are You with Your Smartphones? tips for smarter use of your smartphone
- How to set up Bitlocker encryption on Windows
- Is Your VPN Provider In A 14 Eyes Country? understand why it matters where your VPN is located
- PrivacyTools, a comprehensive guide to being safer online, with the best apps and services for security and anonymity
- Security-in-a-Box, tactics guide to online security
- Simple VPN Comparison Chart, lets you compare the services of dozens of VPN providers
- Sprout Distro’s Zines About Security, a variety of zines offering bite size security learning
- Surveillance Self Defense, the EFF’s guide to protecting yourself online
- Things to Consider When Crossing the US Border, especially important now for all travelers
- Two-factor authentication: What you need to know (FAQ)
- Two Factor Auth List, a list of sites and apps that support two-factor authentication
- Use FileVault to encrypt the startup disk on your Mac
- Which VPN Services Keep You Anonymous in 2017? another guide to choosing the right VPN
- WikiLeaks’ Vault 7 release, which revealed information about the CIA’s cyberweapons
Recommended Virtual Private Networks
These Virtual Private Networks were vetted by Oh Shit! What Now?’s volunteer security consultant. They should be good enough for most uses, but you must do your own research before depending on these VPNs (or any security tools we recommend!) to keep you safe in a high-risk situation.
All original Oh Shit! What Now? materials are copyright free, except where otherwise noted, and can be freely reprinted, shared, and reused. If you’ve got feedback, email us.