Difference between revisions of "FAQ"

 
(3 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
{{Scenario Task
 
{{Scenario Task
 
|Scenario Task Format=Solution
 
|Scenario Task Format=Solution
|Scenario Task Description=This is an interactive guide for those looking for an answer to their digital security questions. It assumes there is a problem you're trying to solve and asks a series of iterative questions to try and direct you to a solution.
+
|Scenario Task Description=This is an introductory guide for those looking for an answer to their digital security concerns. It assumes common threat scenarios and asks a series of iterative questions to direct you to a solution, whether that's a tool, a technique or a link to one of the excellent resources listed herein. Treat every recommendation as one piece of the security puzzle you need to solve.  
  
 
__TOC__
 
__TOC__
  
===Digital security guides and reference manuals===
+
===Guides and reference manuals===
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from inline surveillance
+
*[https://prism-break.org Prism Break] - a directory of Internet services and software for protecting oneself from online surveillance
 
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides
 
*[https://www.privacytools.io Privacy Tools] - a huge collection of privacy-oriented tools, services and guides
*[https://emailselfdefense.fsf.org/ Email Self Defence] - Free Software Foundation
+
*[https://emailselfdefense.fsf.org/ Email Self Defense] - Free Software Foundation
 
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders
 
*[https://digitaldefenders.org/digitalfirstaid/ Digital First Aid Kit] - Digital Defenders
 
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective & Front Line Defenders
 
*[https://securityinabox.org Digital Security Toolkit] - Tactical Technology Collective & Front Line Defenders
Line 22: Line 22:
 
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case
 
*[https://gist.github.com/atcuno/ Privacy and security conscious browsing] - Andrew Case
  
===Security software and services referenced in this guide===
+
===Software and services index===
{{#ask: [[Category:Scenario Tool]]|format=ul }}
+
{{#ask: [[Category:Scenario Tool]]|format=ul|limit=100 }}
  
 +
===Contacts===
 +
If you have a suggestion for a threat scenario or new resource to link to, a recommendation or simply want to help or find something out, please write https://encrypt.to/info@equalit.ie
 
}}
 
}}

Latest revision as of 18:27, 1 December 2015

Solution


This is an introductory guide for those looking for an answer to their digital security concerns. It assumes common threat scenarios and asks a series of iterative questions to direct you to a solution, whether that's a tool, a technique or a link to one of the excellent resources listed herein. Treat every recommendation as one piece of the security puzzle you need to solve.

Guides and reference manuals

Software and services index


Contacts

If you have a suggestion for a threat scenario or new resource to link to, a recommendation or simply want to help or find something out, please write https://encrypt.to/info@equalit.ie




Translations
  Base Page Language Modification dateThis property is a special property in this wiki.
Fa/پرسش‌های متداول FAQ fa 13 March 2016 10:57:10
Ru/ЧаВо FAQ ru 10 March 2016 14:21:11