EFF’s Introduction to Threat Modeling: https://ssd.eff.org/en/module/introduction-threat-modeling

 

TOR

Tor browser: https://www.torproject.org/projects/torbrowser.html.en

How to set up and run a Tor relay: https://www.torproject.org/docs/tor-doc-relay.html.en

What to do when torproject.org is blocked: https://www.torproject.org/projects/gettor

Bridges: more censorship circumvention for Tor: https://www.torproject.org/docs/bridges

Getting help using Tor: https://www.torproject.org/about/contact.html.en

 

BROWSER SAFETY

DuckDuckGo: https://duckduckgo.com/

 

BEHAVIORAL ANALYTICS

NoScript: http://noscript.net/

Privacy Badger: https://www.eff.org/privacybadger

uBlock Origin Firefox: https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/

uBlock Origin Chrome: https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm

 

HTTPS

HTTPS Everywhere: https://www.eff.org/https-everywhere

Test the TLS/SSL security of a website or browser and learn more about implementing TLS/SSL: https://www.ssllabs.com/

EFF’s Let’s Encrypt: https://letsencrypt.org/

Certbot: https://certbot.eff.org/

What Every Librarian Needs to Know About HTTPS:https://www.eff.org/deeplinks/2015/05/what-every-librarian-needs-know-about-https

Tor and HTTPS: https://www.eff.org/pages/tor-and-https

The Library Digital Privacy Pledge: https://libraryfreedomproject.org/ourwork/digitalprivacypledge/

The Library Digital Privacy Pledge endorsements: https://libraryfreedomproject.org/ourwork/digitalprivacypledge/library-privacy-pledge-endorsements/

 

PASSWORDS

KeePassX: https://www.keepassx.org/

1Password: https://agilebits.com/onepassword

LastPass: https://www.lastpass.com/

EFF’s word list: https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt

Yubikey: https://www.yubico.com/

Setting up Yubikey in static password mode: https://www.yubico.com/products/services-software/personalization-tools/

 

MALWARE

ClamAV: http://www.clamav.net/index.html

Malwarebytes: http://www.malwarebytes.org/

OS X native malware protection: http://support.apple.com/en-us/HT202491 and http://support.apple.com/en-us/HT201940

 

FULL DISK ENCRYPTION

Filevault (OS X): https://support.apple.com/en-us/HT204837

Bitlocker (Windows): http://windows.microsoft.com/en-US/windows-vista/BitLocker-Drive-Encryption-Overview

LUKS (GNU/Linux): https://gitlab.com/cryptsetup/cryptsetup/blob/master/README.md

Veracrypt: https://veracrypt.codeplex.com/

 

MOBILE

LFP’s Mobile Privacy Toolkit: https://libraryfreedomproject.org/mobileprivacytoolkit/

Replicant: http://www.replicant.us/

Cyanogenmod: http://www.cyanogenmod.org/

The Guardian Project: https://guardianproject.info/

Signal: https://whispersystems.org/

 

EMAIL

Email Self-Defense from FSF: https://emailselfdefense.fsf.org/en/

Check the security of your email server: http://starttls.info/

 

VPNs

Riseup’s VPN: https://help.riseup.net/en/vpn

OpenVPN: http://openvpn.net/

Bitmask: https://bitmask.net/

Private Internet Access: https://www.privateinternetaccess.com/

A list of possibly good VPNs: http://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/

 

SANDSTORM

https://sandstorm.io

 

OPERATING SYSTEMS

Qubes: https://www.qubes-os.org/

Tails: https://tails.boum.org/

Subgraph: https://subgraph.com/

 

ALA LIBRARY PRIVACY GUIDELINES

ALA Library Privacy Guidelines for E-book Lending and Digital Content Vendors: http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors

ALA Library Privacy Guidelines for Public Access Computers and Networks:
http://www.ala.org/advocacy/library-privacy-guidelines-public-access-computers-and-networks

ALA Library Privacy Guidelines for Library Websites, OPACs, and Discovery Services: http://www.ala.org/advocacy/library-privacy-guidelines-library-websites-opacs-and-discovery-services

ALA Library Privacy Guidelines for Library Management Systems:
http://www.ala.org/advocacy/library-privacy-guidelines-library-management-systems

ALA Library Privacy Guidelines for Data Exchange Between Networked Devices and Services: http://www.ala.org/advocacy/library-privacy-guidelines-data-exchange-between-networked-devices-and-services

ALA Library Privacy Guidelines for Students in K-12 Schools:
http://www.ala.org/advocacy/library-privacy-guidelines-students-k-12-schools

 

EXTRA CREDIT

Surveillance self-defense from EFF: https://ssd.eff.org/

Cryptoparty: http://www.cryptoparty.in/

BleachBit: https://www.bleachbit.org/