Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page Title Page Copyright Page Brief Contents Contents in Detail 1. Get Smart
Take the Online Privacy Test Eight Privacy Tips to Use Right Now Targets and Nontargets Losing Your Privacy
Ways You Can Lose Your Privacy
Protect Yourself Right Now
Tape Over Your Webcam Lock Your Phone, Computer, and Tablet Do a Privacy Check-Up Don’t Email Your ID Use a Password Manager and Install an Antitheft App
Be the Firewall
2. But It’s Just My Phone Number
You Control What You Share Private Spaces and Activities Lock Down Your Personally Identifying Information
Red Alert List Yellow Alert List Green List Information-Sharing Guidelines
He Said, She Said Worst-Case Scenario
3. You Got Hacked
One Compromised Account to Rule Them All What Honan Did Wrong Hack-Proof Your Life
Make Your Address Hard to Find Don’t Link Major Accounts Don’t Use One Service for Everything Back Up Your Everything: Your Contacts, Your Files, Your Photos Encrypt Your Computer’s Hard Drive
What to Do When You’ve Been Attacked
Recover Your Accounts and Data When a Service Gets Hacked
If Your Financial Information May Have Been Exposed in a Data Breach How to Change Your Email Address
Choose a New Home Set Up Forwarding Move In Update Your Accounts Tell Everyone
4. Female Trouble
Recovering from Harassment
When Will It Stop? Staying Strong
Fighting Back
Navigating the Legal System Getting a Restraining Order
Getting Your Private Photos Offline
Doing It Yourself If You’re a Minor Outsourcing the Work
Preventative Maintenance
5. Identity Theft
Signs of Identity Theft Run, Don’t Walk
Place a Fraud Alert Order Free Credit Reports File an Identity Theft Report Contact the IRS Alert Businesses
Don’t Let It Happen to You
Prevent Identity Theft Avoid Phishing Attacks If Your Phone or Computer Is Stolen Install an Antitheft Tracking App Permanently Delete Information from Your Device
6. How to Share
Social Media Checklist
Sharing Only What You Want Friending
But I Can’t Give Up Facebook (or Instagram, or Twitter, or FourSquare, or . . .) Quit Humping My Leg, Facebook
Location Information in Photos Be Smart About Checking In
Controlling What You Share with Google and Google+
Managing Your Google+ Profile Locking Down the Privacy Settings on Your New Phone
Safely Disposing of Old Devices
7. People-Search Websites
But I’m Not That Interesting The Dangers Lurking in People-Finder Sites How People-Finder Sites Get Your Information It Sounds Like There’s Nothing I Can Do, So Why Do Anything?
8. Dating and Sexytime
Make a Smart Dating Profile Screen Out Scammers and Stalkers Make the Internet Wear a Condom Private Time Online: Browsing Privately and Securing Your Sensitive Information
Search Engine Creep Cookies Leave No Trace Keep Your Sensitive Files Private Erase Files Completely Make Your Browser Private Do Not Track Private Browsing
How to Tell If Someone Was on Your Computer
9. Ninja Tricks
Ninja Your Credit Cards Ninja Move: Freeze Your Credit Stealth Out Your Mailing Address Stealth Out Your Phone Number Ninja Tricks: Encrypt Your Private Communication
Protecting Your Email Keeping Your Chats Private Encrypting Your Internet Activity
Ninja Choke Hold: Strong, Easy Privacy Apps Ninja Your IP Address
Use Tor Use a VPN
Get Hard-core: Make a Data Silo
10. I Hate Passwords
How People Steal Passwords But I Have to Share My Password Password Fu
Resources
Chapter 1: Get Smart
Antitheft Apps (see also Chapter 5) Antitracking Plug-ins and Extensions (see also Chapter 8) Password Managers (see also Chapter 10) Searching Your Name (see also Chapter 7)
Chapter 2: But It’s Just My Phone Number
Red Alert List Yellow Alert List Green List
Chapter 3: You Got Hacked
Account Recovery Backup Services and Products Create an Account with a New Email Provider Encryption Products Encryption Programs Place a Fraud Alert
Chapter 4: Female Trouble
Counseling, Therapy, and Support DMCA Takedown Request Services Outsourcing Reputation Services and Image Removal Revenge Porn Support Organizations
Chapter 5: Identity Theft
Antitheft Tracking Apps FTC Identity Theft Report Place a Fraud Alert and Get Copies of Your Credit Reports Place a Security Freeze on Your Credit
Chapter 6: How to Share
Social Media Privacy Settings Photo Sharing Site Privacy Settings
Chapter 7: People-Search Websites
Find Tracking Companies People-Finder Sites Opt Out of Data Mining
Chapter 8: Dating and Sexytime
Browser Plug-ins and Extensions Browser Security Settings
Chapter 9: Ninja Tricks
Credit Freezes and Fraud Alerts Prepaid Credit Cards/Gift Cards OpenPGP Encryption OTR Recommended Privacy Apps Tor (The Onion Router) VoIP
Chapter 10: I Hate Passwords
Password Generators Password Managers
Index Footnotes
1. Get Smart 3. You Got Hacked 5. Identity Theft 9. Ninja Tricks 10. I Hate Passwords
About the Author
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion