CINXE.COM

Keeping Your Data Safe | Surveillance Self-Defense

<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <link rel="icon" href="/favicon.ico" type="image/x-icon" /> <link href="https://ssd.eff.org/module/keeping-your-data-safe" rel="alternate" hreflang="en" /> <link href="https://ssd.eff.org/am/module/keeping-your-data-safe" rel="alternate" hreflang="am" /> <link href="https://ssd.eff.org/ar/module/keeping-your-data-safe" rel="alternate" hreflang="ar" /> <link href="https://ssd.eff.org/es/module/keeping-your-data-safe" rel="alternate" hreflang="es" /> <link href="https://ssd.eff.org/fr/module/keeping-your-data-safe" rel="alternate" hreflang="fr" /> <link href="https://ssd.eff.org/ru/module/keeping-your-data-safe" rel="alternate" hreflang="ru" /> <link href="https://ssd.eff.org/tr/module/keeping-your-data-safe" rel="alternate" hreflang="tr" /> <link href="https://ssd.eff.org/vi/module/keeping-your-data-safe" rel="alternate" hreflang="vi" /> <link href="https://ssd.eff.org/pt-br/module/keeping-your-data-safe" rel="alternate" hreflang="pt-br" /> <link href="https://ssd.eff.org/zh-hans/module/keeping-your-data-safe" rel="alternate" hreflang="zh-hans" /> <link href="https://ssd.eff.org/my/module/keeping-your-data-safe" rel="alternate" hreflang="my" /> <link href="https://ssd.eff.org/ps/module/keeping-your-data-safe" rel="alternate" hreflang="ps" /> <link href="https://ssd.eff.org/th/module/keeping-your-data-safe" rel="alternate" hreflang="th" /> <link href="https://ssd.eff.org/ur/module/keeping-your-data-safe" rel="alternate" hreflang="ur" /> <link rel="publisher" href="https://www.eff.org/" /> <meta property="og:url" content="https://ssd.eff.org/module/keeping-your-data-safe" /><meta property="og:title" content="Keeping Your Data Safe" /><meta property="og:type" content="website" /><meta property="og:url" content="https://ssd.eff.org/module/keeping-your-data-safe" /><meta property="og:image" /><meta property="og:image:width" content="1200" /><meta property="og:image:height" content="600" /><meta property="og:description" content="Your computers—including laptops, cell phones, tablets, and other devices—carry massive amounts of data. Your social contacts, private communications, financial and medical documents, photos are just some of the things on your devices that you want to keep safe. Your device can be seized at the border or by law enforcement,..." /><meta property="twitter:card" content="summary_large_image" /><meta name="twitter:site" content="@eff" /><meta name="twitter:creator" content="@eff" /> <title>Keeping Your Data Safe | Surveillance Self-Defense</title> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="oPLU3Lsu1VMsqs95qgi/C9WcSuBapZLG8tUuJe2eS8gPLmRoYBlGiKXfen3r0bnbym3kXSCAJHUi7p76Y+bpXw==" /> <link rel="stylesheet" media="all" href="/assets/application-42f6a7370ecadbe095d756d14d354e6064345f0cb75e22065653ec659ade0a15.css" /> </head> <body class="guides-section show-action guide-18 guide-keeping-your-data-safe" lang="en"> <a href="#main-content" class="sr-only">Skip to main content</a> <div id="off-canvas" class="off-canvas" role="navigation" aria-label="mobile-navigaton"> <ul> <li><a href="/pages/about-surveillance-self-defense">About</a></li> <li class="has-dropdown"> <a href="#">Language</a> <ul class="dropdown list"> <li dir="ltr" lang="en"><a class="active" href="https://ssd.eff.org/module/keeping-your-data-safe"><span>English</span></a></li> <li dir="ltr" lang="am"><a href="https://ssd.eff.org/am/module/%E1%8B%A8%E1%8B%8D%E1%88%82%E1%89%A5-%E1%8B%B0%E1%8A%85%E1%8A%95%E1%8A%90%E1%89%B5-%E1%8C%A5%E1%89%A0%E1%89%83"><span>አማርኛ</span></a></li> <li dir="rtl" lang="ar"><a href="https://ssd.eff.org/ar/module/%D8%A7%D9%84%D8%AD%D9%81%D8%A7%D8%B8-%D8%B9%D9%84%D9%89-%D8%A8%D9%8A%D8%A7%D9%86%D8%A7%D8%AA%D9%83-%D8%A2%D9%85%D9%86%D8%A9"><span>العربية</span></a></li> <li dir="ltr" lang="es"><a href="https://ssd.eff.org/es/module/manteniendo-sus-datos-seguros"><span>Español</span></a></li> <li dir="ltr" lang="fr"><a href="https://ssd.eff.org/fr/module/assurer-la-s%C3%A9curit%C3%A9-de-vos-donn%C3%A9es"><span>Français</span></a></li> <li dir="ltr" lang="ru"><a href="https://ssd.eff.org/ru/module/%D0%BE%D0%B1%D0%B5%D1%81%D0%BF%D0%B5%D1%87%D0%B5%D0%BD%D0%B8%D0%B5-%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8-%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85"><span>Русский</span></a></li> <li dir="ltr" lang="tr"><a href="https://ssd.eff.org/tr/module/verilerinizi-g%C3%BCvende-tutmak"><span>Türkçe</span></a></li> <li dir="ltr" lang="vi"><a href="https://ssd.eff.org/vi/module/gi%E1%BB%AF-to%C3%A0n-cho-d%E1%BB%AF-li%E1%BB%87u"><span>Tiếng Việt</span></a></li> <li dir="ltr" lang="pt-br"><a href="https://ssd.eff.org/pt-br/module/mantendo-seus-dados-seguros"><span>Português</span></a></li> <li dir="ltr" lang="zh-hans"><a href="https://ssd.eff.org/zh-hans/module/keeping-your-data-safe"><span>Mandarin</span></a></li> <li dir="ltr" lang="my"><a href="https://ssd.eff.org/my/module/%E1%80%99%E1%80%AD%E1%80%99%E1%80%AD%E1%81%8F%E1%80%A1%E1%80%81%E1%80%BB%E1%80%80%E1%80%BA%E1%80%A1%E1%80%9C%E1%80%80%E1%80%BA%E1%80%99%E1%80%BB%E1%80%AC%E1%80%B8%E1%80%80%E1%80%AD%E1%80%AF-%E1%80%9C%E1%80%AF%E1%80%B6%E1%80%81%E1%80%BC%E1%80%AF%E1%80%B6%E1%80%85%E1%80%BD%E1%80%AC-%E1%80%9E%E1%80%AD%E1%80%99%E1%80%BA%E1%80%B8%E1%80%86%E1%80%8A%E1%80%BA%E1%80%B8%E1%80%81%E1%80%BC%E1%80%84%E1%80%BA%E1%80%B8"><span>Burmese</span></a></li> <li dir="rtl" lang="ps"><a href="https://ssd.eff.org/ps/module/keeping-your-data-safe"><span>پښتو</span></a></li> <li dir="ltr" lang="th"><a href="https://ssd.eff.org/th/module/%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B9%80%E0%B8%81%E0%B9%87%E0%B8%9A%E0%B8%A3%E0%B8%B1%E0%B8%81%E0%B8%A9%E0%B8%B2%E0%B8%82%E0%B9%89%E0%B8%AD%E0%B8%A1%E0%B8%B9%E0%B8%A5%E0%B8%82%E0%B8%AD%E0%B8%87%E0%B8%84%E0%B8%B8%E0%B8%93%E0%B9%83%E0%B8%AB%E0%B9%89%E0%B8%9B%E0%B8%A5%E0%B8%AD%E0%B8%94%E0%B8%A0%E0%B8%B1%E0%B8%A2"><span>ภาษาไทย</span></a></li> <li dir="rtl" lang="ur"><a href="https://ssd.eff.org/ur/module/%D8%A7%D9%BE%D9%86%DB%92-%DA%A9%D9%88%D8%A7%D8%A6%D9%81-%D9%85%D8%AD%D9%81%D9%88%D8%B8-%D8%B1%DA%A9%DA%BE%D9%86%D8%A7"><span>اردو</span></a></li> <li><a href="/en/other-translations">More Translations</a></li> </ul> </li> <li><a href="/#index">Index</a></li> <li class="search"> <form autocomplete="off" action="/search" accept-charset="UTF-8" method="get"> <label class="sr-only" for="q"><span class="translation_missing" title="translation missing: en.layouts.application.keywords">Keywords</span></label> <input type="text" name="q" id="q" /> <button>Search</button> </form> </li> </ul> <div class="close-menu"><a href="#">&times;</a></div> </div> <div id="page"> <div id="branding-bar"> <nav id="navbar" class="top-bar" role="navigation"> <ul class="inline menu" dir="ltr"> <li><a href="/pages/about-surveillance-self-defense">About</a></li> <li class="has-dropdown"> <a href="#" onclick="return false">Language</a> <ul class="dropdown list"> <li dir="ltr" lang="en"><a class="active" href="https://ssd.eff.org/module/keeping-your-data-safe"><span>English</span></a></li> <li dir="ltr" lang="am"><a href="https://ssd.eff.org/am/module/%E1%8B%A8%E1%8B%8D%E1%88%82%E1%89%A5-%E1%8B%B0%E1%8A%85%E1%8A%95%E1%8A%90%E1%89%B5-%E1%8C%A5%E1%89%A0%E1%89%83"><span>አማርኛ</span></a></li> <li dir="rtl" lang="ar"><a href="https://ssd.eff.org/ar/module/%D8%A7%D9%84%D8%AD%D9%81%D8%A7%D8%B8-%D8%B9%D9%84%D9%89-%D8%A8%D9%8A%D8%A7%D9%86%D8%A7%D8%AA%D9%83-%D8%A2%D9%85%D9%86%D8%A9"><span>العربية</span></a></li> <li dir="ltr" lang="es"><a href="https://ssd.eff.org/es/module/manteniendo-sus-datos-seguros"><span>Español</span></a></li> <li dir="ltr" lang="fr"><a href="https://ssd.eff.org/fr/module/assurer-la-s%C3%A9curit%C3%A9-de-vos-donn%C3%A9es"><span>Français</span></a></li> <li dir="ltr" lang="ru"><a href="https://ssd.eff.org/ru/module/%D0%BE%D0%B1%D0%B5%D1%81%D0%BF%D0%B5%D1%87%D0%B5%D0%BD%D0%B8%D0%B5-%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8-%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85"><span>Русский</span></a></li> <li dir="ltr" lang="tr"><a href="https://ssd.eff.org/tr/module/verilerinizi-g%C3%BCvende-tutmak"><span>Türkçe</span></a></li> <li dir="ltr" lang="vi"><a href="https://ssd.eff.org/vi/module/gi%E1%BB%AF-to%C3%A0n-cho-d%E1%BB%AF-li%E1%BB%87u"><span>Tiếng Việt</span></a></li> <li dir="ltr" lang="pt-br"><a href="https://ssd.eff.org/pt-br/module/mantendo-seus-dados-seguros"><span>Português</span></a></li> <li dir="ltr" lang="zh-hans"><a href="https://ssd.eff.org/zh-hans/module/keeping-your-data-safe"><span>Mandarin</span></a></li> <li dir="ltr" lang="my"><a href="https://ssd.eff.org/my/module/%E1%80%99%E1%80%AD%E1%80%99%E1%80%AD%E1%81%8F%E1%80%A1%E1%80%81%E1%80%BB%E1%80%80%E1%80%BA%E1%80%A1%E1%80%9C%E1%80%80%E1%80%BA%E1%80%99%E1%80%BB%E1%80%AC%E1%80%B8%E1%80%80%E1%80%AD%E1%80%AF-%E1%80%9C%E1%80%AF%E1%80%B6%E1%80%81%E1%80%BC%E1%80%AF%E1%80%B6%E1%80%85%E1%80%BD%E1%80%AC-%E1%80%9E%E1%80%AD%E1%80%99%E1%80%BA%E1%80%B8%E1%80%86%E1%80%8A%E1%80%BA%E1%80%B8%E1%80%81%E1%80%BC%E1%80%84%E1%80%BA%E1%80%B8"><span>Burmese</span></a></li> <li dir="rtl" lang="ps"><a href="https://ssd.eff.org/ps/module/keeping-your-data-safe"><span>پښتو</span></a></li> <li dir="ltr" lang="th"><a href="https://ssd.eff.org/th/module/%E0%B8%81%E0%B8%B2%E0%B8%A3%E0%B9%80%E0%B8%81%E0%B9%87%E0%B8%9A%E0%B8%A3%E0%B8%B1%E0%B8%81%E0%B8%A9%E0%B8%B2%E0%B8%82%E0%B9%89%E0%B8%AD%E0%B8%A1%E0%B8%B9%E0%B8%A5%E0%B8%82%E0%B8%AD%E0%B8%87%E0%B8%84%E0%B8%B8%E0%B8%93%E0%B9%83%E0%B8%AB%E0%B9%89%E0%B8%9B%E0%B8%A5%E0%B8%AD%E0%B8%94%E0%B8%A0%E0%B8%B1%E0%B8%A2"><span>ภาษาไทย</span></a></li> <li dir="rtl" lang="ur"><a href="https://ssd.eff.org/ur/module/%D8%A7%D9%BE%D9%86%DB%92-%DA%A9%D9%88%D8%A7%D8%A6%D9%81-%D9%85%D8%AD%D9%81%D9%88%D8%B8-%D8%B1%DA%A9%DA%BE%D9%86%D8%A7"><span>اردو</span></a></li> <li><a href="/pages/other-translations"><span class="translation_missing" title="translation missing: en.layouts.application.more_translations">More Translations</span></a></li> </ul> </li> <li><a href="/#index">Index</a></li> <li class="search"> <form autocomplete="off" action="/search" accept-charset="UTF-8" method="get"> <label class="sr-only" for="q"><span class="translation_missing" title="translation missing: en.layouts.application.keywords">Keywords</span></label> <input type="text" name="q" id="q" value="" class="hide" /> <button>Search</button> </form> </li> </ul> <a href="/">ssd.eff.org</a> <a href="#off-canvas" class="open-menu">&#x2261;</a> </nav> </div> <header class="center"> <a class="logo" href="/" title="Home"> <img alt="Home" class="img-responsive" src="/assets/logo-eba4d85a4e344c3517f7dbff8da80c517937dd9dc3bf42c3f5b77444be4487b9.png" /> </a> <div class="site-name">Surveillance<br/>Self-Defense</div> </header> <div id="main-content"> <div class="content"> <p class="breadcrumbs" dir="ltr"> <a href="/module-categories/basics">&lt; Basics</a> </p> <h1 dir="ltr">Keeping Your Data Safe</h1> <p dir="ltr"><strong><span class="translation_missing" title="translation missing: en.guides.show.last_reviewed">Last Reviewed</span></strong>: July 22, 2024</p> <div dir="ltr"><div class="content"><p>Your computers—including laptops, cell phones, tablets, and other devices—carry massive amounts of <a class="glossary-term" href="/zh-hans/glossary/data" data-term_id="163" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/data"&gt;Data&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files.&lt;/p&gt; '>data <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>. Your social contacts, private communications, financial and medical documents, photos are just some of the things on your devices that you want to keep safe.</p> <p>Your device can be seized at the border or by law enforcement, picked up when accidentally left behind at a coffee shop, or burgled from your house—and once it’s in other hands, your data can be quickly copied. Unfortunately, locking your device with passwords, PINs, or biometrics may not protect your data if the device itself is seized. Depending on the type of device and how the data is stored on it, it may be relatively easy to bypass those ways of locking the device. </p> <p>With that said, you can make it harder for those who physically steal your device to unlock its secrets. Here are a few ways you can help keep your data safe.</p> <a name="encrypt-your-data"> </a><h2>Encrypt Your Data <a href="#encrypt-your-data" class="anchor">anchor link</a> </h2> <p>If you use <a class="glossary-term" href="/zh-hans/glossary/encryption" data-term_id="96" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/encryption"&gt;Encryption&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. '>encryption <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>, your <a class="glossary-term" href="/zh-hans/glossary/adversary" data-term_id="81" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/adversary"&gt;Adversary&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical.&lt;/p&gt; '>adversary <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a> needs both your device and your <a class="glossary-term" href="/zh-hans/glossary/password" data-term_id="157" data-description="&lt;div class=&quot;header&quot;&gt; &lt;h3&gt;&lt;a href=&quot;/zh-hans/glossary/password&quot;&gt;Password&lt;/a&gt;&lt;/h3&gt; &lt;button class=&quot;close&quot; aria-describedby=&quot;tooltip-action&quot;&gt;&lt;span class=&quot;icon&quot;&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;A secret meant to be memorized or otherwise protected and kept private, and meant to limit access to something so that only someone who knows the password can gain access. It might limit access to an online account, a device, or something else. A long password based on multiple words may also be called a &quot;passphrase&quot; to remind us that it's not just one &quot;word.&quot; A master password is a main password used to unlock other passwords in a password manager or password safe application.&lt;/p&gt; ">password <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a> (or some way to access your biometrics, like face or <a class="glossary-term" href="/zh-hans/glossary/fingerprint" data-term_id="151" data-description="&lt;div class=&quot;header&quot;&gt; &lt;h3&gt;&lt;a href=&quot;/zh-hans/glossary/fingerprint&quot;&gt;Fingerprint&lt;/a&gt;&lt;/h3&gt; &lt;button class=&quot;close&quot; aria-describedby=&quot;tooltip-action&quot;&gt;&lt;span class=&quot;icon&quot;&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;The keys of public key cryptography are very large numbers, sometimes a thousand or more digits long. A fingerprint is a much smaller number or set of numbers and letters that can be used as a unique name for that key, without having to list all of the key's digits. So, for instance, if you and a friend wished to make sure you both had the same key, you could either spend a long time reading off all the hundreds of digits in the key, or you could each compare your key's fingerprints instead. The fingerprints presented by cryptographic software usually consist of around 40 letters and numbers. If you carefully check that a fingerprint has the right value, you should be safe against impersonation using a fake key. Some software tools may offer more convenient alternative ways to verify a friend's key, but some form of verification needs to happen to prevent communications providers from easily being able to listen in.&lt;/p&gt; ">fingerprint <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>) to unscramble the encrypted data. Therefore, it's safest to <a class="glossary-term" href="/zh-hans/glossary/encrypt" data-term_id="156" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/encrypt"&gt;Encrypt&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;To scramble information or a message mathematically so that it seems meaningless, but can still be restored to its original form by a person or device that possesses a piece of data that can unscramble it (a key.) This limits who can access the information or message because without the right key, it is nearly impossible to reverse the encryption and recover the original information. Encryption is one of several technologies that make up the field called cryptography.&lt;/p&gt; '>encrypt <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a> all of your data, not just a few folders. Most smartphones and computers offer complete, full-disk encryption as an option.</p> <p><strong>For smartphones and tablets:</strong></p> <ul> <li aria-level="1"> <strong>Android</strong> offers full-disk encryption on newer devices when you first set up your device, or anytime afterwards under its “Security” settings for all devices. Older devices may not have this option on by default, so it’s best to check under the “Security” settings.</li> <li aria-level="1"> <strong>Apple</strong> devices such as the iPhone and iPad describe full-disk encryption as “Data Protection” and turn it on by default when you set a passcode on your device when setting it up. Apple also offers "Advanced Data Protection," which extends that protection to the data you store in iCloud. We have a <a href="https://ssd.eff.org/module/how-encrypt-your-iphone">guide for setting that up here</a>. </li> </ul> <p><strong>For computers:</strong></p> <p>Most operating systems, including Windows, macOS, and popular Linux distributions, include some form of full-disk encryption. Head over to our guide for <a href="https://ssd.eff.org/module/how-encrypt-your-windows-device">setting it up for your operating system of choice here</a>.</p> <p>Note that in the case of Windows and macOS, you are inherently trusting Microsoft and Apple respectively. If you are concerned about surveillance from actors who'd potentially have access to secret tools or backdoors then consider an alternative open-source <a class="glossary-term" href="/zh-hans/glossary/operating-system" data-term_id="120" data-description="&lt;div class=&quot;header&quot;&gt; &lt;h3&gt;&lt;a href=&quot;/zh-hans/glossary/operating-system&quot;&gt;Operating system&lt;/a&gt;&lt;/h3&gt; &lt;button class=&quot;close&quot; aria-describedby=&quot;tooltip-action&quot;&gt;&lt;span class=&quot;icon&quot;&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;A program that runs all the other programs on a computer or device. Windows, Linux, Android and Apple's OS X and iOS are all examples of operating systems.&lt;/p&gt; ">operating system <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a> that has been hardened against security attacks, such as <a href="https://tails.net/">Tails</a> or <a href="https://www.qubes-os.org/">Qubes OS</a>. Alternatively, consider installing an alternative disk encryption software, <a href="https://www.veracrypt.fr/en/Home.html">Veracrypt</a>, to encrypt your hard drive.</p> <p class="tip">Remember: Whatever your device calls it, encryption is only as good as your password. If an adversary has your device, they have all the time in the world to figure out your passwords. An effective way of creating a <a href="https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases">strong and memorable password</a> is to use <a href="https://www.eff.org/dice">dice</a> and a <a href="https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt">word list</a> to randomly choose words. Together, these words form your “<a class="glossary-term" href="/zh-hans/glossary/passphrase" data-term_id="123" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/passphrase"&gt;Passphrase&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;A passphrase is a kind of password. We use "passphrase" to convey the idea that a password which is a single word is far too short to protect you and a longer phrase is much better. The webcomic XKCD has a good explanation. http://xkcd.com/936/&lt;/p&gt; '>passphrase <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>.” A “passphrase” is a type of password that is longer for added security. For disk encryption we recommend selecting a minimum of six words. Check out our guide to <a href="https://ssd.eff.org/en/module/creating-strong-passwords">Creating Strong Passwords</a> for more information.</p> <p>Still, while encryption can be useful to prevent casual access, you should preserve truly confidential data by keeping it hidden from physical access by adversaries, or cordoned away on a much more secure device.</p> <a name="create-a-secure-device"> </a><h2>Create a Secure Device <a href="#create-a-secure-device" class="anchor">anchor link</a> </h2> <p>Maintaining a secure environment can be hard. At best, you have to change passwords, habits, and perhaps the software you use on your main computer or device. At worst, you have to constantly think about whether you're leaking confidential information or using unsafe practices. Even when you know the problems, you may not be able to employ solutions because sometimes people with whom you need to communicate use less secure digital security practices. For instance, work colleagues might want you to open email attachments from them, even though you know your adversaries could impersonate them and send you <a class="glossary-term" href="/zh-hans/glossary/malware" data-term_id="114" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/malware"&gt;Malware&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;Malware is short for malicious software: programs that are designed to conduct unwanted actions on your device. Computer viruses are malware. So are programs that steal passwords, secretly record you, or delete your data.&lt;/p&gt; '>malware <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>.</p> <p>So what’s the solution? </p> <p>Consider cordoning off valuable data and communications onto a more secure device. You can use the secure device to keep the primary copy of your confidential data. Only use this device occasionally and, when you do, consciously take much more care over your actions. If you need to open attachments, or use insecure software, do it on another machine.</p> <p>An extra, secure computer may not be as expensive an option as you think. Remember: this likely isn't going to be your everyday machine. It's a computer that is seldom used, and only runs a few programs, so does not need to be particularly fast or new. You can buy an older netbook for a fraction of the price of a modern laptop or phone. Older machines also have the advantage that secure software like <a href="https://tails.net/">Tails</a> may be more likely to work with them than newer models. </p> <p>Some general advice is almost always true: when you buy a device or an operating system, keep it up-to-date with software updates. Updates will often fix security problems in older code that attacks can exploit. Note that some older operating systems may no longer be supported, even for security updates.</p> <a name="when-setting-up-a-secure-computer-what-steps-can-you-take-to-make-it-secure"> </a><h3>When Setting up a Secure Computer, What Steps Can You Take to Make it Secure? <a href="#when-setting-up-a-secure-computer-what-steps-can-you-take-to-make-it-secure" class="anchor">anchor link</a> </h3> <ol> <li aria-level="1"> <strong>Keep your device well-hidden</strong>: Store it somewhere where you are able to tell if it has been tampered with, such as a locked cabinet (and don’t discuss its location).</li> <li aria-level="1"> <strong>Encrypt your computer’s hard drive</strong>: As noted above, use a strong passphrase so that if it is stolen, the data will remain unreadable without the passphrase.</li> <li aria-level="1"> <strong>Install a privacy—and security—focused operating system like <a href="https://tails.net/">Tails</a> or <a href="https://www.qubes-os.org/">Qubes</a></strong>: Although either of these options can be an intimidating change from the operating systems you might normally be used to, using either one for simply storing, editing, and writing confidential information will be much easier than if you were to default to them for all your regular activities.</li> <li aria-level="1"> <strong>Keep your device offline</strong>: Unsurprisingly, the best way to protect yourself from internet attacks or online surveillance is to never connect to the internet. You could make sure your secure device never connects to a local network or Wi-Fi and only copy files onto the machine using physical media, like USB drives or DVDs. In network security, this is known as having an “<a class="glossary-term" href="/zh-hans/glossary/air-gap" data-term_id="83" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/air-gap"&gt;Air gap&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;A computer or network that is physically isolated from all other networks, including the Internet, is said to be air-gapped.&lt;/p&gt; '>air gap <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>” between the computer and the rest of the world. While extreme, this can be an option if you want to protect data that you rarely access, but never want to lose (such as an <a class="glossary-term" href="/zh-hans/glossary/encryption-key" data-term_id="97" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/encryption-key"&gt;Encryption key&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; An encryption key is a piece of information that is used to convert a message into an unreadable form. In some cases, you need the same encryption key to decode the message. In others, the encryption key and decryption key are different. '>encryption key <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>, a list of passwords, or a backup copy of someone else's private data that has been entrusted to you). Or, an encrypted USB <a class="glossary-term" href="/zh-hans/glossary/key" data-term_id="91" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/key"&gt;Key&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; In cryptography, a piece of data which gives you the capability to encrypt or decrypt a message. '>key <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a> kept safely hidden can be a simpler solution if you only need to store sensitive data.</li> <li aria-level="1"> <strong>Don’t log in to your usual accounts</strong>: If you do use your secure device to connect to the internet, create separate web or email accounts that you use for communications from this device, and use <a href="https://www.torproject.org/">Tor</a> (see guides for <a href="https://ssd.eff.org/en/module/how-use-tor-linux">Linux</a>,<a href="https://ssd.eff.org/en/module/how-use-tor-macos"> macOS</a>, <a href="https://ssd.eff.org/en/module/how-use-tor-windows">Windows</a>, and <a href="https://ssd.eff.org/module/how-to-use-tor-on-android-and-iphone">smartphones</a>) to keep your <a class="glossary-term" href="/zh-hans/glossary/ip-address" data-term_id="108" data-description="&lt;div class=&quot;header&quot;&gt; &lt;h3&gt;&lt;a href=&quot;/zh-hans/glossary/ip-address&quot;&gt;IP address&lt;/a&gt;&lt;/h3&gt; &lt;button class=&quot;close&quot; aria-describedby=&quot;tooltip-action&quot;&gt;&lt;span class=&quot;icon&quot;&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online.&lt;/p&gt; ">IP address <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a> hidden from those services. If someone is choosing to specifically target your identity with malware, or is only intercepting your communications, separate accounts and Tor can help break the link between your identity and this particular machine.</li> </ol> <p>While having one secure device that contains important, confidential information may help protect it, it creates an obvious target. There’s also a risk of losing the only copy of your data if the machine is destroyed. If your adversary would benefit from you losing all your data, don't keep it in just one place—no matter how secure. Encrypt a copy and keep it somewhere else.</p> <p>A variation on the idea of a secure machine is to have an insecure machine: a device that you only use when going into a dangerous place or attempting a risky operation. Many journalists and activists, for instance, take a basic netbook with them when they travel. This computer does not have any of their documents or usual contact or email information on it so there’s minimal loss if it is confiscated or scanned. You can apply the same strategy to mobile phones. If you usually use a smartphone, consider buying a cheap throwaway or "<a class="glossary-term" href="/zh-hans/glossary/burner-phone" data-term_id="86" data-description='&lt;div class="header"&gt; &lt;h3&gt;&lt;a href="/zh-hans/glossary/burner-phone"&gt;Burner phone&lt;/a&gt;&lt;/h3&gt; &lt;button class="close" aria-describedby="tooltip-action"&gt;&lt;span class="icon"&gt;&lt;/span&gt;&lt;/button&gt; &lt;/div&gt; &lt;p&gt;A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.&lt;/p&gt; '>burner phone <img aria-hidden="true" src="/assets/efforg/info-7ae1fb29e1e734b20023f3e3470316c82b84a7e4b9f1d1e2f49e399f1f8de2d3.png"></a>" when traveling for specific communications.</p> </div></div> </div> </div> </div> <footer> <div class="center"> <a class="logo" href="/" title="Home"> <img src="https://ssd.eff.org/assets/logo-footer-216585e7032331c8163db209c6fba94ae72baee66b6d4e62ef1b67fe534d7c84.png" alt="Surveillance Self-Defense logo" /> </a> <div class="site-name"> Surveillance<br>Self-Defense </div> <div class="footer-nav" role="navigation"> <ul class="flex-parent" dir="ltr"> <li><a href="/pages/about-surveillance-self-defense">About</a></li> <li><a href="/#index">Index</a></li> <li><a href="/glossary">Glossary</a></li> <li><a href="/pages/credits">Credits</a></li> <li><a href="https://supporters.eff.org/donate">Donate</a></li> </ul> </div> </div> </footer> <div id="footer-bottom" class="center" dir="ltr"> <ul class="flex-parent"> <li><a href="https://www.eff.org/copyright">Copyright (CC BY)</a></li> <li><a href="https://www.eff.org/policy">Privacy</a></li> </ul> </div> <script type="importmap" data-turbo-track="reload">{ "imports": { "jquery": "/assets/jquery-dffa084d8915bf507ac4c876f4dedea0cab68baacd9266ff82a66706ef56f264.js", "ckeditor/ckeditor": "/assets/ckeditor/ckeditor-53b7205163eeca5b511b43e34f1df6b2b0b401d11cf2c6884adfbbc4150c2881.js", "jquery-ui/jquery-ui": "/assets/jquery-ui/jquery-ui-0507eea9215b37aa68aced7033f3f0919a5f17b9a8c1ac7308e0fba7fd11e3bd.js", "railsujs": "/assets/railsujs-57c6effce760f866866bfa973534bccaa9f2ae315c8a64066bad179fa22bce0f.js", "select2/select2": "/assets/select2/select2-f79333530e65fc28b0339227e71cfc769d0229c39d7b2955c6045ad5e4f15f65.js", "sortable": "/assets/sortable-37be89ef017d92ccb51699051b444072861ad6d6593081f9935b43c601d955b6.js", "toastui-editor": "/assets/toastui-editor-b824a348e845a818ec06beadd61d1d53a267dd434b98e5fb02c9a80852b52ba2.js", "datatables.net": "/assets/datatables.net-0f394ccc57627c8f9eb6e629fe6db7e959b2cc5d2819e95f0d7fe2ba83dec8b0.js", "application": "/assets/application-48a5218f9ce75c4772ab1f2d4bd5da662eb82e8573e3ba95d4208eba9ed0cc66.js", "cms": "/assets/cms-1b0c9275141f603f9878406f671d40ac25a6cd61b47a6b12530718d687dcd80c.js", "ckeditor/otters-ckeditor": "/assets/ckeditor/otters-ckeditor-a9d8d6e2ba21bd0e980093eb169427f8ff929d81bcf0154096faf46070fdc2c9.js", "otters/cms/manual": "/assets/otters/cms/manual-86f2a686441461c7be9c9d5f8e29dad21a8a1c729cc2d2596c76c8ad1cf89121.js", "otters/cms/menus": "/assets/otters/cms/menus-410967d3575fd76437f229cf5f20e0dfb554346d059baef58f7f7e47488977aa.js", "otters/cms/nodes": "/assets/otters/cms/nodes-66e061029610ef74b7c97ecb095ae1cbf85191696a218851367af5a84a5b718e.js", "otters/cms/search": "/assets/otters/cms/search-05b89023d7b4bae4eb27c390119df904c2a2f2930b17dccd523fbd48dee474fd.js", "otters/cms": "/assets/otters/cms-aacfc3fe121fc90c1ae9907c42fd1ac96381ce40495714d410ebda6d41c3254c.js", "efforg/application": "/assets/efforg/application-17440bb0f83ef30483503814976f91b12a56e4015f179d060f215636a794a0d3.js", "efforg/cms": "/assets/efforg/cms-8e6c351a16668fe27601a562dcef4d608e38a9fadd1ae57d45a575ec1f35ab12.js" } }</script> <link rel="modulepreload" href="/assets/application-48a5218f9ce75c4772ab1f2d4bd5da662eb82e8573e3ba95d4208eba9ed0cc66.js"> <link rel="modulepreload" href="/assets/cms-1b0c9275141f603f9878406f671d40ac25a6cd61b47a6b12530718d687dcd80c.js"> <script src="/assets/es-module-shims.min-d89e73202ec09dede55fb74115af9c5f9f2bb965433de1c2446e1faa6dac2470.js" async="async" data-turbo-track="reload"></script> <script type="module">import "application"</script> <noscript> <img referrerpolicy="no-referrer-when-downgrade" src="https://anon-stats.eff.org/matomo.php?idsite=52&amp;rec=1" style="border:0" alt="" /> </noscript> <script type="text/javascript"> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="https://anon-stats.eff.org/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '52']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.type='text/javascript'; g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s); })(); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10