Digital Force Protection Guide
Digital Force Protection Guide
Section titled “Digital Force Protection Guide”Looking for a quick privacy and cyber security guide on a single page? Quick Guide here
Checklists
Section titled “Checklists”Privacy & Security Guides
Section titled “Privacy & Security Guides”Essential Protection
Section titled “Essential Protection”| Guide | Description |
|---|---|
| Traveling Security | Field security for high-risk situations |
| Quick DFP Guide | Fast reference for privacy tools |
| Digital Security | Basic digital security practices |
External Resources
Section titled “External Resources”| Resource | Description |
|---|---|
| EFF Surveillance Self-Defense | Comprehensive security guide from EFF |
| Privacy Guides | Privacy-focused tool recommendations |
| Security in a Box | Digital security for activists |
Quick Reference
Section titled “Quick Reference”Password Managers
Section titled “Password Managers”Recommended:
- Bitwarden - iOS | Android | Desktop
- KeePassXC - All Platforms
Avoid:
- LastPass (security breaches)
Multi-Factor Authentication (MFA)
Section titled “Multi-Factor Authentication (MFA)”Best Options:
Avoid:
- SMS - Vulnerable to SIM-jacking attacks
- Authy - Requires phone number, not open-source
- Google Authenticator - Sync is not end-to-end encrypted
VPN Recommendations
Section titled “VPN Recommendations”Top VPNs for privacy:
-
- No email required
- Accepts cash/crypto
- Proven privacy record
-
- No logging
- Transparent privacy policy
-
- Free tier available
- Proven privacy record
VPNs to Avoid:
- ExpressVPN, PIA, CyberGhost, Zenmate (all owned by KAPE Technologies)
Secure Messaging
Section titled “Secure Messaging”| App | Phone # Required? | Best For |
|---|---|---|
| SimpleX | No | Protests, maximum privacy, family emergency plans |
| Signal | Yes | General secure messaging |
| Element/Matrix | No | Decentralized communities |
Why SimpleX:
- No phone number, email, or any identifier required
- Works on wifi-only devices (kids’ iPads, old phones without service)
- Multiple profiles for different contexts
- Decentralized — no central server to surveil or shut down
Pre-Browsing Security Checks
Section titled “Pre-Browsing Security Checks”Before sensitive browsing, verify your configuration:
- DNS / IP Leak Test - Confirm your location
- Cover Your Tracks (EFF) - Check browser fingerprinting
- AdBlock Test - Verify ad blocking
Additional Resources
Section titled “Additional Resources”Community Resources
Section titled “Community Resources”Communities
Section titled “Communities”Critical Security Measures
Section titled “Critical Security Measures”Disable 2G Connectivity
Section titled “Disable 2G Connectivity”| Platform | How to Disable 2G |
|---|---|
| Android 12+ | Settings → Network → SIMs → Allow 2G → OFF |
| Samsung | Settings → Connections → Mobile Networks → Network Mode → LTE/5G only |
| iPhone | Enable Lockdown Mode (Settings → Privacy & Security → Lockdown Mode) |
When In Doubt, Power Off
Section titled “When In Doubt, Power Off”At protests or high-risk situations:
- Keep phone off unless actively recording or communicating
- Power off immediately if you feel surveilled
- Power off before any potential arrest
- A powered-off phone is dramatically harder for forensics
Why Digital Force Protection Matters
Section titled “Why Digital Force Protection Matters”For rapid response volunteers, digital security protects:
- Your identity from those who might target you
- Your community from surveillance
- Your communications from interception
- Your data from seizure
Good digital hygiene should be practiced continuously, not just during incidents.