This page was translated from English. The English version may be more up-to-date. As with most chat apps, communications can be made between either individuals or a group, allowing you to send end-to ...
This page was translated from English. The English version may be more up-to-date. If used correctly, end-to-end encryption can help protect the contents of your messages, text, and even files from ...
A passive adversary is one that can listen to your communications, but cannot directly tamper with them. Surveillance Self-Defense About Index Glossary Credits Donate ...
This page was translated from English. The English version may be more up-to-date. This is an overview of network censorship, but it is not comprehensive. There are different ways of beating internet ...
Phones can get viruses and other kinds of malware (malicious software), either because the user was tricked into installing malicious software, or because someone was able to hack into the device ...
An older method for copying files from a local computer to a remote one, or vice versa. The job of FTP programs (and the FTP servers that stored the files) have mostly been replaced by web browsers ...
Clues that show that your device may have been broken into or tampered with. Surveillance Self-Defense About Index Glossary Credits Donate ...