Checklists
Get ready for anything—our checklists have you covered!
Casual Internet User
- Strong unique passwords
Create strong and unique passwords for each of your accounts to enhance security.
- Limit information shared
Be mindful of the personal information you share online to protect your privacy.
- Private browser
Using a private browser can help safeguard your online activities from prying eyes.
- Private search engine
Opt for a privacy-focused search engine to enhance your online anonymity.
- Virtual Private Network (VPN)
A Virtual Private Network (VPN) can provide an extra layer of security for your internet connection.
- Mobile privacy settings
Adjust your mobile settings to improve your privacy and security.
- Desktop privacy settings
Make necessary changes to your desktop settings to enhance your privacy.
Casual Internet User

Protestor
- Turn your phone completely off
Turn your phone completely off to be 100% sure nothing is leaking from it. Airplane mode is not enough!
- Plan your trip
Carefully plan your route to and from the protest to avoid potential hotspots of police activity and surveillance.
- Only use encrypted communication
Use end-to-end encrypted messaging apps to communicate with other protestors.
- Back up your phone
Back up your data in case your phone is lost or confiscated by the police.
- Cover yourself
Wear clothing that conceals your identity and protects you from surveillance.
Protestor

Whistleblower
- Find countries that won't extradite you
In case you need to flee.
- Only use encrypted communication
Use end-to-end encrypted messaging apps to communicate.
- Learn about advanced OpSec techniques
Ensure you maintain a high level of operational security to stay anonymous.
Whistleblower

Social Media Influencer

Hacker
Hacker

Mass Surveillance
Mass Surveillance

Digital Nomad
Digital Nomad

Darknet User
Darknet User

Social Media Influencer
Create strong and unique passwords for each of your accounts to enhance security.
Use 2FA to secure your accounts.
Limit the amount of personal information shared online, including details about family, home address, and daily activities.
With a large following, you're a target for hackers. Verify email senders and be cautious of emails asking for personal information or containing suspicious links.