Difference between revisions of "Lesson 5 Further Reading"
| Line 1: | Line 1: | ||
| − | How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10 | + | *How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10 |
| − | How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11 | + | *How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11 |
| − | Mobile Security https://securityinabox.org/en/portable_security | + | *Mobile Security https://securityinabox.org/en/portable_security |
| − | Surveillance Self Defense https://ssd.eff.org/ | + | *Surveillance Self Defense https://ssd.eff.org/ |
| − | How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9 | + | *How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9 |
Revision as of 21:35, 28 May 2014
- How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
- How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
- Mobile Security https://securityinabox.org/en/portable_security
- Surveillance Self Defense https://ssd.eff.org/
- How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9