Privacy & Security Resources

Free guides and articles to help you understand and improve your digital privacy. Filter by topic or difficulty level.

Threat ModelingBeginner

Threat Modeling for Everyday People

Learn how to identify what you are protecting, who you are protecting it from, and which countermeasures actually matter for your situation.

8 min readRead →
OPSECIntermediate

Compartmentalization: Separating Your Digital Identities

Practical strategies for isolating your personal, professional, and anonymous online identities to limit the blast radius of any single compromise.

12 min readRead →
OPSECAdvanced

Operational Security Mistakes That Expose You

An advanced look at the most common OPSEC failures — from metadata leaks to behavioral patterns — and how to avoid them.

15 min readRead →
Browser PrivacyBeginner

Hardening Firefox for Privacy

Step-by-step guide to configuring Firefox for strong privacy without breaking everyday browsing.

10 min readRead →
Browser PrivacyIntermediate

Understanding Browser Fingerprinting

How websites identify you without cookies by combining dozens of browser and device attributes into a unique fingerprint.

11 min readRead →
Device HardeningBeginner

Phone Privacy: Hardening Android Without Root

Practical steps to reduce tracking and data collection on stock Android phones without needing root access or a custom ROM.

9 min readRead →
EncryptionBeginner

Full Disk Encryption: Why It Matters

Why encrypting your entire drive is one of the most important security steps you can take, and how to enable it on every major platform.

7 min readRead →
EncryptionIntermediate

PGP Email Encryption: A Practical Guide

A hands-on guide to setting up PGP/GPG for email encryption, managing keys, and integrating with your email client.

14 min readRead →
Secure CommunicationsBeginner

Understanding End-to-End Encryption

What end-to-end encryption actually means, how it works under the hood, and why it matters for your private communications.

8 min readRead →
Secure CommunicationsIntermediate

Choosing a Secure Messenger: Signal vs Matrix vs Session

A detailed comparison of three privacy-focused messaging platforms — their encryption, metadata protection, and real-world trade-offs.

13 min readRead →
NetworkingIntermediate

VPN vs Tor: When to Use Which

A clear-eyed comparison of VPNs and Tor — their actual privacy properties, limitations, and the right use case for each.

11 min readRead →
Data PrivacyBeginner

Removing Your Personal Data from the Internet

A step-by-step process for finding and requesting removal of your personal information from data brokers, people-search sites, and other public databases.

10 min readRead →
Data PrivacyBeginner

Password Management Done Right

Why password managers are essential, how to choose one, and best practices for securing your digital life with strong, unique credentials.

8 min readRead →
Cloud SecurityBeginner

Cloud Security Basics for Small Businesses

A practical introduction to securing your AWS, Azure, or GCP environment — IAM, encryption, logging, and the most common misconfigurations that lead to breaches.

10 min readRead →
Healthcare ComplianceBeginner

HIPAA Compliance Checklist: Where to Start

A practical starting point for healthcare organizations navigating HIPAA compliance — the Security Rule, risk assessments, policies, BAAs, and staff training.

12 min readRead →
Business SecurityIntermediate

Building an Incident Response Plan

How to build a practical incident response plan for your business — preparation, detection, containment, recovery, and post-incident review.

11 min readRead →
Business SecurityBeginner

Why Security Awareness Training Matters

How to build an effective security awareness training program for your team — phishing, social engineering, password hygiene, and creating a security-conscious culture.

9 min readRead →