Skip to content

Privacy Wiki

Welcome to our Privacy Wiki!

Here, the Privacy Guides community is building the comprehensive resource for understanding digital privacy, the threats we face, and the tools we can use to protect ourselves. This wiki is a living document, and we encourage you to contribute if you have something to add.

This is a selection of featured pages, but you can browse the sidebar for more topics, or use the search bar to find something specific. If you’re looking for somewhere to start, start here to learn about why privacy is important, and then check out our threat modeling guide to learn how to make informed decisions about the software and services you use.

Getting Started

Technology Tips

Intro to Passwords
Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices, and our secrets. Despite often being the only thing between us and an adversary who’s after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced.
VPN Overview
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you’re posting or reading, but they can get an idea of the domains you request.
Creating Accounts
Often people sign up for services without thinking. Maybe it’s a streaming service to watch that new show everyone’s talking about, or an account that gives you a discount for your favorite fast food place. Whatever the case may be, you should consider the implications for your data now and later on down the line.
Common Threats
Broadly speaking, we categorize our recommendations into the threats or goals that apply to most people. You may be concerned with none, one, a few, or all of these possibilities, and the tools and services you use depend on what your goals are. You may have specific threats outside these categories as well, which is perfectly fine!

Moving On Up

Last updated on