Privacy & Security Guides

Educational resources to help you understand, evaluate, and implement privacy-respecting tools for your organization.

53 guides found

Featured Educational Beginner

Security Keys: What They Do and Why Your Organization Needs Them

A comprehensive guide to hardware security keys - what they protect against, how to choose the right one, and deployment strategies for nonprofits.

Featured Ecosystem Intermediate

The Nextcloud Stack: Complete Google Workspace Replacement

How one self-hosted platform can replace Google Drive, Docs, Calendar, Meet, Slack, Calendly, and more—with complete data ownership.

Featured Educational Beginner

Zero-Knowledge Encryption: What It Means and Why It Matters

Understand zero-knowledge encryption and why it is the gold standard for protecting sensitive data from everyone—including your service provider.

Featured Ecosystem Beginner

The Proton Ecosystem: Integrated Privacy from One Provider

How Proton Mail, VPN, Drive, Calendar, and Pass work together as a unified privacy suite.

Featured Ecosystem Intermediate

The Nitrokey Universe: Open Source Hardware Security

From security keys to phones to laptops, Nitrokey offers a complete open-source hardware security ecosystem.

Featured Ecosystem Advanced

Building a Complete Self-Hosted Privacy Stack

A comprehensive guide to assembling fully self-hosted infrastructure for maximum data control.

Featured Use case Intermediate

Privacy Stack for Immigration Legal Services

Essential security tools for immigration attorneys and legal aid organizations protecting client confidentiality in a hostile enforcement environment.

Featured Educational Intermediate

Self-Hosted vs Managed: The Real Tradeoffs

Should your organization run its own servers or use managed services? A practical framework for making this critical infrastructure decision.

Featured Use case Intermediate

Privacy Stack for Reproductive Health Organizations

Security tools for reproductive health clinics and advocacy organizations operating in a post-Dobbs legal environment.

Featured Use case Advanced

Privacy Stack for Investigative Journalists

Essential security tools for journalists protecting sources, unpublished materials, and their own safety.

Featured Use case Intermediate

Privacy Stack for Civil Rights Organizations

Security tools for civil rights groups, police accountability organizations, and social justice movements.

Featured Educational Intermediate

Jurisdiction Matters: Where Your Data Lives Affects Your Rights

Why the physical location of your data and the legal jurisdiction of your providers can make or break your privacy protections.

Featured Use case Beginner

Privacy on a Shoestring: Secure Your Organization for Under $50/Month

Maximum security on minimum budget. Free and low-cost tools that provide real protection for resource-constrained organizations.

Featured Use case Beginner

Privacy for Non-Technical Teams: Security Without the Complexity

Simple, user-friendly privacy tools for organizations without IT staff. Focus on ease of use without sacrificing protection.

Featured Comparison Beginner

Proton Mail vs Tuta: Which Encrypted Email Is Right for You?

A detailed comparison of the two leading encrypted email providers—features, pricing, jurisdiction, and our recommendation.

Featured Educational Intermediate

Threat Modeling 101: Who Is Actually After Your Organization?

Before choosing security tools, you need to understand who might target you and what they are capable of. A practical guide to threat modeling for mission-driven organizations.

Featured Comparison Beginner

Mullvad vs IVPN: Privacy-First VPNs Compared

Comparing the two VPNs that refuse affiliate marketing and prioritize privacy over growth.

Featured Comparison Intermediate

Nitrokey vs YubiKey: Open Source vs Maximum Compatibility

Comparing the leading security keys—when transparency matters versus when compatibility is king.

Featured Comparison Intermediate

Nextcloud vs Google Workspace: Complete Comparison

Self-hosted privacy versus convenience—evaluating the full replacement.

Featured Comparison Beginner

Best Encrypted Email Providers for 2026

Our ranked recommendations for zero-knowledge encrypted email—from Swiss privacy to German GDPR protection.

Featured Educational Beginner

End-to-End Encryption: What It Actually Protects

End-to-end encryption is the gold standard for private communication, but it does not protect everything. Understanding what E2E does and does not do.

Featured Comparison Beginner

Best VPNs for Nonprofits in 2026

Privacy-first VPN recommendations—no affiliate marketing, no hype, just honest evaluation.

Featured Comparison Beginner

Best Password Managers for Organizations in 2026

Ranked recommendations for team password management—security, features, and value.

Featured Comparison Intermediate

Best Security Keys by Use Case in 2026

Which security key to buy—from budget bulk deployment to maximum security.

Featured Threat risk Beginner

How Organizations Get Hacked: The Top 5 Attack Vectors

Understanding the most common ways nonprofits get compromised—and how to prevent them.

Featured Threat risk Intermediate

What Happens When Law Enforcement Subpoenas Your Cloud Provider

Understanding what Google, Microsoft, and others will hand over—and how zero-knowledge changes the equation.

Featured Threat risk Beginner

Why SMS 2FA Isn't Enough: The SIM Swap Problem

Understanding why text message verification can be bypassed and what to use instead.

Featured Migration Intermediate

Migrating from Google Workspace to Nextcloud

Step-by-step guide to moving your organization from Google to self-hosted Nextcloud.

Featured Migration Beginner

Migrating from Gmail to Proton Mail

Complete guide to switching from Gmail to Proton Mail—including email import and address transition.

Featured Migration Beginner

Migrating from LastPass to Bitwarden

Emergency guide to leaving LastPass after breaches—step-by-step migration.

Use case Intermediate

Privacy Stack for Criminal Justice Reform Organizations

Security tools for organizations working on bail reform, prison abolition, reentry services, and police accountability.

Use case Beginner

Privacy Stack for Faith-Based Social Justice Organizations

Security tools for religious organizations doing sanctuary work, immigrant support, and social justice advocacy.

Use case Intermediate

Privacy Stack for Voter Registration Organizations

Security tools for voter registration drives, election protection efforts, and civic engagement organizations.

Use case Advanced

Privacy Stack for Whistleblower Support and Tip Lines

Maximum security tools for organizations receiving confidential tips and supporting whistleblowers.

Use case Intermediate

Privacy for Remote and Distributed Teams

Security tools and practices for organizations with staff working from home, co-working spaces, and on the road.

Use case Beginner

Privacy for Solo Practitioners and Consultants

Streamlined security for independent consultants, solo attorneys, and one-person organizations.

Use case Advanced

Enterprise Privacy: Scaling Security for Large Organizations

Security infrastructure for organizations with 50+ staff, multiple offices, and complex compliance requirements.

Comparison Beginner

Signal vs Element: Encrypted Messaging Compared

When to use Signal's simplicity versus Element's federation and features.

Comparison Beginner

Bitwarden vs 1Password: Password Managers Compared

Open source simplicity versus polished features—choosing the right password manager.

Comparison Intermediate

GrapheneOS vs CalyxOS: Secure Mobile OS Comparison

Maximum security versus better app compatibility—choosing your de-Googled phone OS.

Comparison Beginner

Standard Notes vs Joplin: Encrypted Note Apps Compared

Simple encryption versus feature-rich—choosing your secure notes app.

Comparison Beginner

Cal.com vs Calendly: Open Source Scheduling

Self-hostable scheduling versus the incumbent—when to switch.

Comparison Beginner

CryptPad vs Google Docs: Zero-Knowledge Collaboration

Encrypted real-time collaboration versus the Google standard.

Comparison Beginner

Best Cloud Storage for Privacy in 2026

Zero-knowledge cloud storage options ranked—from managed services to self-hosted.

Educational Intermediate

Open Source vs Closed Source: What It Means for Security

Does open source software really provide better security? Understanding the security implications of transparent versus proprietary code.

Threat risk Intermediate

Location Tracking: What Your Phone Reveals About You

Understanding how phones track location and who can access that data.

Threat risk Intermediate

Metadata: What "Encrypted" Doesn't Protect

End-to-end encryption protects content—but metadata can reveal just as much.

Educational Intermediate

Five Eyes, Nine Eyes, Fourteen Eyes: What They Mean for Your Privacy

Understanding the intelligence-sharing alliances that affect where you should store sensitive data.

Migration Intermediate

Migrating from Slack to Element (Matrix)

Guide to replacing Slack with encrypted, federated team communication.

Migration Beginner

Migrating from Evernote to Joplin

Move your notes to an open-source, encrypted alternative.

Migration Beginner

Migrating from Zoom to Jitsi Meet

Replace Zoom with free, open-source, encrypted video conferencing.

Migration Beginner

Migrating from Calendly to Cal.com

Switch to open-source scheduling with data control.

Migration Intermediate

Migrating to GrapheneOS from Android or iPhone

Install the most secure mobile OS on your Pixel phone.