Resources for the global digital safety training community.
Credits
Last Updated 2015-05This module covers specific browsing practices and tools for remaining anonymous online, and circumvention for accessing blocked or censored content online. Many tools and strategies to circumvent Internet restrictions are in existence today; however, some tools offer more security features than others, and may be better for your unique needs for security than others.
The number of countries where the use of encryption is illegal has decreased, but legal concerns are still very real for some participants. Before a training, review the laws of where your participants live and work, as well as the laws of where you’re conducting the training, to confirm that the use of technologies highlighted in this session, including the Tor Browser Bundle, is allowed.
You may also find the content from the Security Education Companion on Censorship Circumvention And Encrypting Your Traffic With VPN and the Browser Extensions To Make You Safer to be useful.