Secure Messaging
End-to-end encrypted apps ensure only you and your recipient can read your messages — not your carrier, not the app company, not law enforcement without a device in hand.
The gold standard for private messaging. End-to-end encrypted calls, texts, and file sharing. Collects almost no metadata. Open-source and audited by independent security researchers.
Uses Signal's encryption protocol for message content, but collects significant metadata — who you contact, how often, your location, and device info — which is shared with Meta. Better than SMS, but not ideal for high-risk situations.
Designed for activists and journalists in high-risk environments. Works without internet — messages route over Bluetooth or Wi-Fi directly between devices. No central server means nothing to subpoena.
Tip: Even with encrypted messaging, be mindful of who has physical access to your phone. Device seizure is the most common way encrypted messages are accessed by law enforcement — not by breaking the encryption.
VPNs
A VPN (Virtual Private Network) hides your internet traffic from your internet provider and masks your IP address. It does not make you anonymous, but it significantly reduces your exposure to network-level surveillance.
No account required — you pay with a randomly generated account number. Accepts cash and cryptocurrency. A strict no-logs policy has been verified by independent audits and confirmed when Swedish authorities seized servers and found nothing.
Run by the team behind ProtonMail in Switzerland, with strong privacy laws. Fully audited, open-source apps, and a verified no-logs policy. Has a free tier with no data cap — unusual for any reputable VPN.
Tor routes traffic through three volunteer-run relays, making it very difficult to trace back to you. Slower than a VPN, but stronger anonymity. Best used via the Tor Browser for general web access or in high-risk situations.
Avoid: Free VPNs with no clear business model. Many sell your browsing data to the same brokers that government agencies buy from. A VPN is only as trustworthy as the company running it.
Private Browsing
Standard browsers track your activity extensively. These alternatives minimize fingerprinting, block trackers, and reduce the data trail left behind as you navigate the web.
Built on Firefox with all traffic routed through Tor. Blocks trackers, resists fingerprinting, and hides your IP by default. The strongest option for anonymous browsing — especially for researching sensitive topics.
Firefox is open-source and highly configurable for privacy. Pairing it with the free uBlock Origin extension blocks ads, trackers, and many data collection scripts. A strong everyday option that balances privacy with usability.
A privacy-focused browser with built-in tracker blocking and a search engine that doesn't build a profile on you. Good for everyday use on mobile. Does not route traffic through Tor, but significantly reduces casual surveillance.
Secure Email
Standard email — Gmail, Outlook, Yahoo — is not private. Providers scan content, share data with third parties, and comply with government requests. These alternatives use end-to-end encryption so only the intended recipient can read your messages.
End-to-end encrypted email based in Switzerland. Proton cannot read your messages and has no ability to hand over email content to authorities — only metadata. Free tier available. Used widely by journalists and activists.
German-based encrypted email with a strong privacy record. All emails, contacts, and calendars are encrypted on-device before being stored. Free tier includes 1GB storage. Slightly less polished than Proton but equally secure.
Creates disposable email aliases that forward to your real inbox — so you can sign up for services without exposing your real address. Use it alongside Proton Mail to prevent your email from becoming a tracking vector.
Device Security
The safest message is one that can't be read even if your phone is seized. These tools protect what's stored on your device — your most vulnerable point of exposure.
Use a 6+ digit PIN or a passphrase instead of Face ID or fingerprint unlock. Biometric unlocks can be compelled by law enforcement without a warrant in many jurisdictions — a PIN cannot. Disable biometrics before attending protests or crossing borders.
Modern iPhones encrypt data by default when a passcode is set. Android requires enabling encryption in settings on many devices. Full disk encryption makes a seized device unreadable without the PIN — even to tools like Cellebrite.
A hardened, privacy-focused Android operating system for Pixel phones. Removes Google services entirely and adds layers of security far beyond standard Android. Recommended for high-risk individuals — journalists, activists, legal clients — who need maximum protection.
At a border crossing: You have fewer rights at ports of entry. CBP can demand you unlock your device. Consider traveling with a clean device, logging out of all accounts, or enabling lockdown mode (iOS) before you arrive.