Difference between revisions of "Lesson 5 Further Reading"
(Created page with " How to use mobile phones as securely as possible How to use smartphones as securely as possible Mobile Security Surveillance Self Defense How to protect y...") |
|||
| (2 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
| − | + | *[https://securityinabox.org/en/chapter-10 How to use mobile phones as securely as possible] | |
| − | + | ||
| − | + | *[https://securityinabox.org/en/chapter-11 How to use smartphones as securely as possible ] | |
| − | + | ||
| − | + | *[https://securityinabox.org/en/portable_security Mobile Security] | |
| + | |||
| + | *[https://ssd.eff.org/ Surveillance Self Defense] | ||
| + | |||
| + | *[https://securityinabox.org/en/chapter-9 How to protect yourself and your data when using social networking sites] | ||