top of page

Information and Tools for Protecting Privacy and Security

Suggested Tools:

These are the tools we recommend for protecting your privacy and security. These are tools we trust and use ourselves.* While these tools are great for what they do, it is important to remember that tools are just that — tools. They are not silver bullets that can protect your privacy no matter what you do. Part of staying safe and private online is about the technologies you use and part of it is about the way you use the Internet in the first place. Unless an underlying sense of privacy and security guide the ways you use these tools, they cannot do what they are intended to do. Remember: you are the guardian of your privacy; These are just tools.

*In full disclosure, we have  affiliate aggrements with some of the organizations/companies that release these tools and make a small profit if you make a purchase using these links. Rest assured that our decision to recommend a tool is never influenced by whether or not the organization/company behind the tool offers an affiliate program; We never recommend tools we do not use ourselves. 

internet_edited.jpg

Web Browsers

Because of the nature of browsing the web, it is important to select a browser that respects and protects your privacy.  We recomend two types of browsers: One for "everyday" browsing that respects and protects privacy at an acceptable level and one that is more private and secure for those times that call for greater privacy and security. 

Icon_vpn.png

VPN

VPNs (Virtual Private Networks) are tools for routing traffic through an encrypted tunnel before it reaches the Internet. When used properly, a trustworthy VPN can protect data sent over the Internet, circumvent censorship, and circumvent surveillance. But not all VPNs are created equal. 

14191286471_19c50ea564_n.jpg

Email

Email is a double-edged sword. It is the standard method of communicating for many individuals and most businesses; It is also decidedly insecure. Since it is transmitted in plain text, anyone (anywhere) who intercepts an email can read it at will. The solution is to encrypt your emails. This used to be a difficult process...

Blog

Check out the Enemy of the [SURVEILLANCE] State blog for news, tips, and Open Source tools to help you protect your privacy and security. 

[UNDER CONSTRUCTION — CHECK BACK SOON!]

Podcast

Enemy of the {SURVEILLANCE] State also hosts an educational and entertaining podcast featuring news, tips, and Open Source tools to help you protect your privacy and security.

 

Be sure to subscribe and check back often for new episodes. You can listen here or wherever you grab podcasts.

Presentations

C. Mitchell Shaw is an engaging and informative speaker available to address groups of all sizes. In his presentation, Mitchell addresses both the probelms and the solutions in a way that resonates with audiences. In clear language (without relying on tech jargon), Mitchell shows how anyone can take simple steps to better protect their privacy in an age of mass digital surveillance.

Shop

Enemy of the [Surveillance] State offers products to help you protect your privacy. From a secure and private computer operating system that you can carry in your pocket and run on almost any computer from a USB stick to a privacy-friendly smart phone to either replace or supplement your existing smart phone, the tools you need are here. 

Enemy of the [SURVEILLANCE] State

C. Mitchell Shaw

enemyofsurveillance@protonmail.com

bottom of page