About This Site
There's a lot of amazing resources for privacy and security out there. Many of them are geared towards people who are moderately tech-savvy or better. However, there aren't many that are geared towards beginners and non-tech people. There are many people who are interested in privacy or security, but are just so overwhelmed and unsure. Where do I start? What's most important? What's not very important? What do you mean there's more than one type of encryption? Are some better than others? Why does metadata matter? Can't you just tell me what to use?
The answer, in a word, is no. I can't tell you what services and products to use any more than I can tell you what to wear or what to eat. It varies from person to person. But I can help you understand the concepts, services, and products available and make those decisions on your own.
How It Works
This site is designed in a book format. It is designed to go in-depth on various ideas, subjects, and concepts, and make you - the reader - feel educated and capable of making decisions that are right for you. But it is also designed to be standalone in the sense that you can feel free to skip around. If you're here and you just want to know more about encrypted email, you can skip to that section. If you want to know more about safe browsing, skip to that section. If you want to understand cybersecurity, identity theft, and hackers, skip to that section. Additionally, this site/book is designed to feed back into itself. Links will either go to other relevant sections on this site, or will link to outside articles as a way of citing my sources.
This site/book is split up into three major sections. "Most Important" covers the things I think are most important and most relevant to anyone: things like cybersecurity, identity protection, and basic good internet hygiene. The middle section is called "Moderately Important" and deals with things that are still important but not urgent: encryption, backups, and communication. Finally, "Less Important" deals with things that will give you added layers of security and privacy, but probably aren't critically important if you're practicing the other procedures.
It is important to note that privacy and security are not either/or concepts. Despite what some elitists might try to claim, you can have some privacy while keeping a Facebook account, but not as much as if you got rid of it. Likewise you can have some security without using multifactor authentication, but not nearly as much as if you used it. Privacy and security are spectrums. No matter how much you go live in a cabin in the woods, if you piss off the right person with enough resources they will find you. (Just look at Ted Kaczynski.) The goal of this site/book is not to teach you to drop off the grid and live in a cabin in the woods with no risks whatsoever. For one, that's not possible. For another, I would argue that's not a life worth living. (If you disagree, don't let me stop you.) Rather this site/book is to help you learn how surveillance and tracking works, how to opt out of it, and decide what the right level is for you. Not everything here will apply to everyone, and that's okay. Even taking some of the steps moves you further along that scale.
This site/book will be updated as often as necessary. I keep a GitLab where you can see all changes made in each update and submit your own suggestions as well. My goal is not to pull the rug out from under you, but rather to keep this site relevant, current, and accurate. I also post a daily feed of privacy- and security-related news articles and a weekly blog that you can feel free to follow to stay on the cutting edge of this ever changing field.
Finally, I have made this book/site in good faith. I do not have any vested financial interest in any of of the services, products, or companies I have listed except where noted here and on each relevant page. The following services I have listed referral or affiliate links which will offer me some sort of financial compensation if you sign up using the links provided: privacy.com, ProtonMail, ProtonVPN, and SimpleLogin. I have also provided non-affiliate or non-referral links immediately next to the product for those who are uncomfortable using those links for any reason. I am not a cybersecurity expert of any kind, but I have invested thousands of hours into research and testing. I also spend much of my time listening to discussions on various up and coming technologies, news, and emerging developments.
Having said all that, please enjoy this site/book. I hope you find it useful, and if you have any questions, respectfully-worded feedback, constructive criticism, or suggestions, I welcome them all. Thank you, and I hope this helps you take back some of your civil liberties.