Digital Defense Guide

Defending yourself against the surveillance state

Introduction

The year is 2025 and we are living under fascism. In the United States, the Trump administration is eroding our rights through a ruthless series of policy changes that are shaking the foundations of our democracy, and the rising tide of fascism can be felt around the world.

The 14 Characteristics of Fascism (Lawrence Britt, 2003)

Now more than ever, we need to protect ourselves and each other, especially those who are marginalized and those who are fighting back. This government does not concern itself with the constitution. This government is not above committing blatant human rights violations. Even if you personally don't feel your safety is at risk, now is not the time for complacency. It's immigrants under the crosshairs today—it may be you next.

This is a guide on how to protect your digital privacy and security from government surveillance, extremist groups, and other threats we face today. This guide provides a high-level overview of the most important information you'll need to defend yourself. Expandable sections and links to sources provide more information. See the Checklist that supplements this guide with an actionable list of steps you can take.

References to the law in this guide are specific to the United States. This guide is not legal advice. None of the recommendations in this guide are sponsored.


Fundamentals

Don't talk to the police

If the police come to you with questions, do not talk to them, even if you are innocent, even if you think you have nothing to hide.

Understand why.
  • Talking to the police cannot help you; it can only hurt you. What you tell the police can only be used against you by the prosecution.
  • Talking to the police may implicate you in a crime you didn't realize you were committing.
  • Lying to the police is illegal, even if it's by accident. Accidentally lying to the police is easy to do.
  • Information you give the police can be used to convict you, even if you're innocent.
  • Police can misremember facts about your conversation.
  • Police can and will lie to manipulate you into revealing information.
Don't Talk to the Police (Regent University School of Law, 2012)

If the police come to your door, do not let them into your home. Do not consent to a search without a warrant. Tell your roommates to do the same.

If the police present a warrant, ask to see it and verify the name and address.

Know Your Rights (Electronic Frontier Foundation)

Take your digital security seriously

If you understand why you should never talk to the police, you understand why you need to protect access to your data. Imagine giving the police a copy of every message you've ever sent—things you said in private, with the expectation they would stay private.

This doesn't just endanger you, but also your friends, family, and anyone else you talk to.

Know how secure is "secure enough"

This guide recommends measures you can take to protect yourself, but if you're trying to figure out which of those recommendations are most important for you to act on, you need to consider your specific circumstances and risk factors.

What do you mean by circumstances and risk factors?

What are you trying to protect yourself from?

  • Having your data stolen?
  • Having your accounts taken over?
  • Having your privacy or anonymity compromised?
  • Attacks on your physical security?
  • Legal prosecution?

Who are you trying to protect yourself from?

  • Common criminals?
  • Hate groups?
  • Local government?
  • The federal government?

What are your risk factors?

  • Are you a journalist, activist, or otherwise more likely to be targeted by law enforcement?
  • Do you regularly attend protests, cross the border, or otherwise encounter law enforcement?
  • Are there circumstances making it more likely for law enforcement to be able to secure a warrant to search your devices or request your data from companies?
  • Do you belong to a marginalized group that is more likely to be targeted by law enforcement or hate groups?
  • Could having your privacy compromised make you a target for hate groups?

The recommendations given in this guide are intended for activists, groups facing systemic oppression, and others at higher risk of being targeted by law enforcement. However, these recommendations are also good general practice for anyone concerned about their privacy and digital security.

See the Checklist for more general guidance on what actions to prioritize.

Your Security Plan (Electronic Frontier Foundation)

Secure your passwords and accounts

Use a password manager

Use a password manager; it's easier than memorizing passwords. A password manager makes it easier to use different passwords for each site, which is critical for your security.

Use a different, random password for each site.

Let your password manager generate a long, completely random password for each site. It doesn't have to be memorable; that's what the password manager is for. If you get the browser extension, it will autofill your passwords when you visit a site. If you get the mobile app, you can look them up on your phone.

Use random answers for security questions.

For sites that ask you to answer "security questions", do not give honest answers. Often the answers are public information that a determined attacker can look up. Instead, give a fictional or random answer and store it in your password manager alongside your password.

A Word About “Security Questions” (Electronic Frontier Foundation)
What if my web browser asks to save my passwords?

Web browsers like Chrome, Firefox, Edge, and Safari have features built in to save your passwords for you. This is less secure than using a dedicated password manager, but still better than no password manager at all.

Bitwarden is a free and secure password manager. The EFF also has a guide on choosing a password manager.

Bitwarden (Bitwarden)
Choosing a Password Manager (Electronic Frontier Foundation)
Lightbulb
Why is this important?

Using a different password for each site means that if one site is hacked, attackers can't use that password to log into your other accounts. When a site is hacked and users' passwords are leaked, that information is widely available to attackers.

Most password managers will tell you if one of your passwords has been leaked. If that's the case, it's especially important you change it everywhere it's used.

Generate a strong memorable passphrase

You will need to create and memorize a secure random password to unlock your password manager. The EFF recommends choosing six random dictionary words, which is both secure and easier to memorize than random letters and numbers. You can use Bitwarden's online password generator tool for this, or for extra security, you can roll some dice.

Generate a passphrase online (Bitwarden)
Generate a passphrase with dice (Electronic Frontier Foundation)
Lightbulb
Why is this important?

If an attacker gets access to your password manager, they have access to all your passwords, so it's critical that this password be secure.

If you're being targeted by law enforcement, they may have the resources to crack an insecure password.

Use two-factor authentication

You should enable two-factor authentication (2FA, also called multi-factor authentication or MFA) wherever you can.

Your password manager can generate 2FA authentication codes for you, replacing apps like Google Authenticator and Authy.

Avoid SMS-based 2FA when you can.

In many cases, an attacker can easily trick your phone carrier into giving them access to your SMS messages. However, SMS-based 2FA is still better than none.

Use passkeys.

Some sites now offer a new form of authentication called passkeys, which replace passwords entirely. Unlike passwords and other 2FA methods, passkeys can't be phished. Use them when you can. Store your passkeys in your password manager so that they're available across your devices and you don't have to worry about getting locked out of your accounts if you lose a device.

How to: Enable Two-factor Authentication (Electronic Frontier Foundation)
Lightbulb
Why is this important?

2FA is important even when you're using secure passwords, because it helps protect you against phishing. Note that only passkeys provide complete protection against phishing.

Phishing is one of the most common ways that attackers are able to take over accounts; even security professionals fall fall victim to it. Phishing can be particularly dangerous if it's targeted, so it's especially important you enable 2FA if you believe someone might want to take over one of your accounts.


Protect your devices

Enable device encryption

Ensure device encryption is enabled in settings. If possible, disable any features allowing Microsoft or Apple to unlock your device for law enforcement.

Check if encryption is enabled.

Many devices—particularly ones made in the past couple of years—have device encryption enabled by default. Others may require you to enable the feature in settings. This can vary by operating system, manufacturer, and how old the device is, so it's worth checking.

Check if Microsoft or Apple can unlock your device.

You will need to consider who has the ability to unlock your device and read the data on it. Windows, iOS, and macOS devices have a feature that gives Microsoft or Apple a key to unlock your device. This is convenient if you lose your password, but also gives them the opportunity to hand that key over to law enforcement if required to do so. The alternative option is that only you are given a copy of the key, which you can store someplace safe like a password manager.

See the EFF's guides on device encryption for more information.

How to: Encrypt Your Windows, Mac, or Linux Computer (Electronic Frontier Foundation)
How to: Encrypt Your iPhone (Electronic Frontier Foundation)
Lightbulb
Why is this important?

As long as you use a secure password, encrypting your devices protects your data from people who have physical access to them. This keeps your data secure in case your phone or computer is lost or stolen, as well as if they're seized or searched by law enforcement.

In most cases, law enforcement cannot compel you to give up your device encryption passwords. This protects your data even if they have a warrant to search your device.

Lock down your devices when necessary

If you plan on attending a protest, crossing a border, or otherwise expect to encounter law enforcement, keep your phone powered off if possible.

There may be cases where you risk encountering law enforcement, but also need access to your phone for communication or to take photos. In this case, you have a few options.

Protect your device when you can't power it off.

If you're not able to fully power down your device, disable biometric unlock (fingerprint and face unlock) and hide lock screen notifications. Both iOS and Android have a feature that allows you to do this quickly and discreetly without digging into settings. In both cases, it disables biometric unlock and lock screen notifications only once, until you next unlock your phone.

Additionally, both iOS and Android have a feature that allows you to take photos and videos from the lockscreen, without unlocking the device.

Attending a Protest (Electronic Frontier Foundation)
Consider Lockdown Mode on iOS.

iOS has a feature called Lockdown Mode, which disables many features of your device to enhance security. This is intended for extreme cases where you expect to be personally targeted by sophisticated attacks. Enabling this feature means making a big compromise in terms of usability and convenience, which may or may not make sense for you. Do not confuse this with the Android feature that disables biometric unlock and lock screen notifications, also called lockdown mode on some devices.

How to: Enable Lockdown Mode on iPhone (Electronic Frontier Foundation)
Understand the potential consequences for refusing to unlock your device at the border.

Noncitizens may be denied access into the country for refusing to unlock their devices. Citizens cannot be denied access into the country, but may be detained or have their devices seized.

If you're crossing the US border, your best defense is limiting the information you bring with you. If you're a noncitizen who needs access to the country, and giving law enforcement access to your data has the potential to be incriminiating, consider wiping your device or bringing a burner phone, then downloading your data from the cloud once you're in the country.

Note that having your rights respected at the border is not guaranteed under the Trump administration. Lawful permanent residents and even some US citizen—such as those from Puerto Rico—have been caught up in Trump's racist and draconian immigration policy.

Things to Consider When Crossing the U.S. Border (Electronic Frontier Foundation)
The Problem with Mobile Phones (Electronic Frontier Foundation)
How to: Get to Know Android Privacy and Security Settings (Electronic Frontier Foundation)
How to: Get to Know iPhone Privacy and Security Settings (Electronic Frontier Foundation)
Lightbulb
Why is this important?

Device encryption is most effective at protecting your data when the device is powered off. It's easier for law enforcement to bypass device encryption if your device is powered on. This also protects you from having your location tracked by your carrier or Apple/Google.

While law enforcement cannot compel you to give up your passwords, they can compel you to unlock your device with a fingerprint or face unlock.


Use secure messaging apps

Many messaging apps advertise end-to-end encryption, which guarantees that only you and the people you're talking to—not companies, criminals, or law enforcement—can see what you say.

However, if your privacy is critical, you should prefer Signal over others. Signal is widely regarded by security experts to be a robust and secure messaging platform. It's also free and easy to use.

Signal (Signal Foundation)
How to: Use Signal (Electronic Frontier Foundation)
Use Signal to remove metadata from photos.

If you're going to be taking photos at a protest, be aware that photos contain invisible metadata that could be used to identify you, including the exact time, location, and camera used to take them. An easy way to avoid sharing sensitive metadata is to only share these photos via Signal, which removes metadata when sharing images. If you need to share a photo elsewhere, you can send a copy to yourself in the Signal app and then download it to get a metadata-free copy.

Lightbulb
Why is this important?

With SMS and unencrypted chat apps, law enforcement can get a warrant to read your messages, without needing access to your device.


Protect your anonymity on the web

Be skeptical of what VPNs promise

VPN ads are everywhere these days, and they make a lot of promises, many of which are misleading at best.

Understand what VPNs do not do.
  • VPNs do not protect you from all threats. They provide marginal additional security over standard internet connections, which are almost always encrypted. You're much more likely to get hacked because of a phishing scam, which VPNs do not protect you against. For that, you'll need to secure your passwords and accounts.
  • VPNs do not fully protect you against law enforcement. In many cases, law enforcement can go to the VPN provider with a warrant and request your information.
  • VPNs are not a tool for total anonymity. For that, use Tor.
  • VPNs are not necessary to use public Wi-Fi networks. This guidance may have been true in the past, but is not relevant these days.
Understand what VPNs are useful for.

VPNs are primarily useful for circumventing internet censorship. They can make it appear that you're connecting from a different location, bypassing some geographic restrictions.

Note however that many sites and services block traffic from VPNs.

Choosing the VPN That's Right for You (Electronic Frontier Foundation)
Lightbulb
Why is this important?

VPNs can be an important tool for circumventing censorship, but it's important that you don't rely on them to fully protect your anonymity.

Use Tor

Web traffic is almost always encrypted (your browser will warn you if it is not), meaning that nobody between you and the website you're visiting can read your data. However, the web does not provide anonymity, meaning that:

  1. The websites you visit—and often data brokers and advertising companies—know who you are, even if you don't log in.
  2. Your internet service provider, employer, school, VPN provider, law enforcement, and possibly other parties may be able to see which websites you visit.

If you need to browse the web anonymously, use Tor. Tor is a special web browser that is designed to protect your anonymity. It protects you from website owners knowing who you are (see caveats below) and from other parties seeing which websites you visit.

Tor (The Tor Project)

You do not need to use Tor for everyday web browsing. It's slower than other browsers, and is missing many features by design. Use Tor when you need to protect your identity.

Understand the caveats of using Tor.
  • Tor can't protect you if you use it to log into existing accounts. If you're the only one with access to an account, they won't suddenly think you're someone else because you're using Tor.
  • Tor can't protect you if you provide websites with personally identifiable information. Unless it's end-to-end encrypted, you must assume that anything you type into a website could be recovered by law enforcement. They may not even need a warrant; data brokers will sell it to them freely.
  • Tor does not prevent other apps on your computer from compromising your anonymity. For that, you'll need Tails.
  • While they cannot see which websites you're visiting, some people, such as your internet service provider, may be able to see that you're using Tor. Using Tor isn't illegal, but could bring attention to you if someone is looking for it.
Lightbulb
Why is this important?

Knowing which sites you're visiting and what you're doing on them is information that law enforcement can use against you.

Law enforcement may not even need a warrant to get this information; data brokers will sell it to them freely.

Use Tails

For the highest degree of protection against surveillance, use Tails. Tails is not necessary for most people, but worth considering if you are an activist, journalist, or anyone else whose security or freedom are at risk.

Tails is an operating system, like Windows, macOS, or Linux, except it lives on a USB flash drive. You can plug it into any computer and reboot to load Tails. When you're done, Tails leaves no trace on the computer.

Tails comes with Tor, meaning that anything you do in Tails is anonymous. You can store sensitive documents on the flash drive, and they're securely encrypted.

Tails (The Tor Project)
Lightbulb
Why is this important?

If you're being specifically targeted by law enforcement, and they're willing to expend significant resources, protecting your security, privacy, and anonymity becomes exceptionally more difficult.