Briar

Briar အချက်အလက်စာရွက်

Briar အချက်အလက်စာရွက်

 
အချက်အလက်များကို ဝိုင်ဖိုင်၊ ဘလူးတုသ်နှင့် အင်တာနက်သုံး၍ Briar ကနေ မျှဝေခြင်း

အချက်အလက်များကို ဝိုင်ဖိုင်၊ ဘလူးတုသ်နှင့် အင်တာနက်သုံး၍ Briar ကနေ မျှဝေခြင်း

Surveillance Self-Defense Guides

အခြေခံ | Basics

Why Metadata matters

Why Metadata Matters

Choosing Your Tools

Choosing Your Tools

Communicating with Others

Communicating with Others

Your Security Plan

Your Security Plan

Keeping Your Data Safe

Keeping Your Data Safe

Creating Strong Passwords

Creating Strong Passwords

Seven Steps to Digital Security

Seven Steps to Digital Security

What Should I Know About Encryption?

What Should I Know About Encryption?

 

နည်းပညာလမ်းညွှန်များ | Tool Guides

How to Delete Your Data Securely on Windows (reduced file size version) (text only version)

How to Delete Your Data Securely on Windows (reduced file size version) (text only version)

How to Delete Your Data Securely on macOS (text only)

How to Delete Your Data Securely on macOS
(text only)

How to Delete Your Data Securely on Linux (reduced file size version) (text only version)

How to Delete Your Data Securely on Linux (reduced file size version) (text only version)

How to Avoid Phishing Attacks

How to Avoid Phishing Attacks

How to Enable Two-Factor Authentication

How to Enable Two-Factor Authentication

How to Encrypt your iPhone

How to Encrypt your iPhone

How to Use KeePassXC

How to Use KeePassXC

How to Use WhatsApp on iOS

How to Use WhatsApp on iOS

How to Use WhatsApp on Android

How to Use WhatsApp on Android

How to Use Tor for Linux

How to Use Tor for Linux

How to Use Tor for Windows

How to Use Tor for Windows

How to Use Tor for macOS

How to Use Tor for macOS


ထပ်မံသင်ယူစရာများ | Further Learning

Attending a Protest

Attending a Protest

Understanding and Circumventing Network Censorship

Understanding and Circumventing Network Censorship

A Deep Dive on End-to-End Encryption:  How Do Public Key Encryption Systems Work?

A Deep Dive on End-to-End Encryption:
How Do Public Key Encryption Systems Work?

Key Verification

Key Verification

Protecting Yourself on Social Networks

Protecting Yourself on Social Networks

Facebook Groups: Reducing Risks

Facebook Groups: Reducing Risks

Choosing the VPN that’s Right for You

Choosing the VPN that’s Right for You

How Do I Protect Myself Against Malware?

How Do I Protect Myself Against Malware?

Privacy for Students

Privacy for Students

Key Concepts in Encryption

Key Concepts in Encryption

What is Fingerprinting?

What is Fingerprinting?

 

လုံခြုံရေးအခြေအနေ | Security Scenarios

Academic Researcher

Academic Researcher

Activist or Protester

Human Rights Defender

Human Rights Defender

Journalism Student

Journalism Student

Journalist on the Move

Journalist on the Move

LGBTQ Youth

LGBTQ Youth

Mac User

Mac User

Online Security Veteran

Online Security Veteran

Want a Security Starter Pack?

Want a Security Starter Pack?