Educational resources to help you understand, evaluate, and implement privacy-respecting tools for your organization.
53 guides found
A comprehensive guide to hardware security keys - what they protect against, how to choose the right one, and deployment strategies for nonprofits.
How one self-hosted platform can replace Google Drive, Docs, Calendar, Meet, Slack, Calendly, and more—with complete data ownership.
Understand zero-knowledge encryption and why it is the gold standard for protecting sensitive data from everyone—including your service provider.
How Proton Mail, VPN, Drive, Calendar, and Pass work together as a unified privacy suite.
From security keys to phones to laptops, Nitrokey offers a complete open-source hardware security ecosystem.
A comprehensive guide to assembling fully self-hosted infrastructure for maximum data control.
Essential security tools for immigration attorneys and legal aid organizations protecting client confidentiality in a hostile enforcement environment.
Should your organization run its own servers or use managed services? A practical framework for making this critical infrastructure decision.
Security tools for reproductive health clinics and advocacy organizations operating in a post-Dobbs legal environment.
Essential security tools for journalists protecting sources, unpublished materials, and their own safety.
Security tools for civil rights groups, police accountability organizations, and social justice movements.
Why the physical location of your data and the legal jurisdiction of your providers can make or break your privacy protections.
Maximum security on minimum budget. Free and low-cost tools that provide real protection for resource-constrained organizations.
Simple, user-friendly privacy tools for organizations without IT staff. Focus on ease of use without sacrificing protection.
A detailed comparison of the two leading encrypted email providers—features, pricing, jurisdiction, and our recommendation.
Before choosing security tools, you need to understand who might target you and what they are capable of. A practical guide to threat modeling for mission-driven organizations.
Comparing the two VPNs that refuse affiliate marketing and prioritize privacy over growth.
Comparing the leading security keys—when transparency matters versus when compatibility is king.
Self-hosted privacy versus convenience—evaluating the full replacement.
Our ranked recommendations for zero-knowledge encrypted email—from Swiss privacy to German GDPR protection.
End-to-end encryption is the gold standard for private communication, but it does not protect everything. Understanding what E2E does and does not do.
Privacy-first VPN recommendations—no affiliate marketing, no hype, just honest evaluation.
Ranked recommendations for team password management—security, features, and value.
Which security key to buy—from budget bulk deployment to maximum security.
Understanding the most common ways nonprofits get compromised—and how to prevent them.
Understanding what Google, Microsoft, and others will hand over—and how zero-knowledge changes the equation.
Understanding why text message verification can be bypassed and what to use instead.
Step-by-step guide to moving your organization from Google to self-hosted Nextcloud.
Complete guide to switching from Gmail to Proton Mail—including email import and address transition.
Emergency guide to leaving LastPass after breaches—step-by-step migration.
Security tools for organizations working on bail reform, prison abolition, reentry services, and police accountability.
Security tools for religious organizations doing sanctuary work, immigrant support, and social justice advocacy.
Security tools for voter registration drives, election protection efforts, and civic engagement organizations.
Maximum security tools for organizations receiving confidential tips and supporting whistleblowers.
Security tools and practices for organizations with staff working from home, co-working spaces, and on the road.
Streamlined security for independent consultants, solo attorneys, and one-person organizations.
Security infrastructure for organizations with 50+ staff, multiple offices, and complex compliance requirements.
When to use Signal's simplicity versus Element's federation and features.
Open source simplicity versus polished features—choosing the right password manager.
Maximum security versus better app compatibility—choosing your de-Googled phone OS.
Simple encryption versus feature-rich—choosing your secure notes app.
Self-hostable scheduling versus the incumbent—when to switch.
Encrypted real-time collaboration versus the Google standard.
Zero-knowledge cloud storage options ranked—from managed services to self-hosted.
Does open source software really provide better security? Understanding the security implications of transparent versus proprietary code.
Understanding how phones track location and who can access that data.
End-to-end encryption protects content—but metadata can reveal just as much.
Understanding the intelligence-sharing alliances that affect where you should store sensitive data.
Guide to replacing Slack with encrypted, federated team communication.
Move your notes to an open-source, encrypted alternative.
Replace Zoom with free, open-source, encrypted video conferencing.
Switch to open-source scheduling with data control.
Install the most secure mobile OS on your Pixel phone.