Given the shifting state of the law, people seeking an abortion, or any kind of reproductive healthcare that might end with the termination of a pregnancy, may need to pay close attention to their digital privacy and security. We've previously covered how those involved in the abortion access movement can keep themselves and their communities safe. We've also laid out a principled guide for platforms to respect user privacy and rights to bodily autonomy. This post is a guide specifically for anyone seeking an abortion and worried about their digital privacy. There is a lot of crossover with the tips outlined in the previously mentioned guides; many tips bear repeating.
The increasing risk that the Supreme Court will overturn federal constitutional abortion protections has refocused attention on the role digital service providers of all kinds play in facilitating access to health information, education, and care—and the data they collect in return.
In a post-Roe world, service providers can expect a raft of subpoenas and warrants seeking user data that could be employed to prosecute abortion seekers, providers, and helpers. They can also expect pressure to aggressively police the use of their services to provide information that may be classified in many states as facilitating a crime.
Whatever your position on reproductive rights, this is a frightening prospect for data privacy and online expression. That’s the bad news.
This page is organized into different security-related threats. You can jump to the ones that most concern you. Along with each scenario is a list of digital security tips to neutralize the threat!
This post will detail the steps involved to configure an Android device to audit the traffic of any app installed on it, requiring no other device to be physically present. The device will have to be rooted in order to install the software required for this setup. All of the software required in this post is free of cost and open-source, not requiring an extra penny of investment above and beyond that of the device itself. The end result will allow the user to open an app in a specialized way that allows the traffic to be logged, without attaching extraneous devices or requiring the device to be connected to any specific network or access point.
The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.
A mirror of the site can be downloaded for archival and offline use: https://digitalfirstaid.org/dfak-offline.zip
Git repo: https://gitlab.com/rarenet/dfak
License: Creative Commons By-Attribution v4.0
These links are not meant to be scary - they are meant to be strictly informative. These things are not at all exclusive to furries - but are seen throughout the internet and in real life. These guides are made to make the fandom a safer place and to make people more aware of issues they otherwise may not know about.
While this is primarily for use in the Furry Fandom it applies to everyone online, minor or not. This is just a guide to help people spot signs of abuse. Please know that some of these alone do not mean anything - however if there is a pattern please ask a trusted friend or family member about what you are experiencing. Please pass this on to people who you feel may be suffering from abuse. Feel free to repost as this is a community resource.
To access personal data that isn't available in Your Account or in your device (e.g. your search history):
- Go to Request My Data.
- Select the data you want to receive.
- Click Submit Request when you're done.
- Click the validation link in your confirmation email.
- Once your request is processed, a secure download link will be sent to the e-mail address associated with the account.
A password manager/generator that takes a master password, a URL, a username, and optionally a serial number (for when you have to change passwords) and (re)generates the password for you. Requires no database or third party storage - the right password is always generated for you. Desktop versions, browser plugins, and a cli tool.
No notepad feature, so no storing your 2fa recovery codes there.
A curated checklist of tips to protect your digital security and privacy.
A smart solution to the problem of passwords. Cloverleaf generates passwords on demand, using the name of the app you're making a password for and a master password to derive a passcode. Enter those two things and you don't need to store the passcode because you can re-generate it whenever you want.
Can be installed as a native app and used offline.
This updated guide aims to provide introduction to various tracking techniques, id verification techniques and guidance to creating and maintaining anonymous identities online including social media accounts safely.
Will this guide help you protect yourself from the NSA, the FSB, Mark Zuckerberg or the Mossad if they’re out to find you? Probably not … Mossad will be doing “Mossad things” and will probably find you no matter how hard to try to hide.
Creative Commons Attribution 4.0 International (cc-by-4.0)
Threat models and tools for staying safe, private and informed while Online, used by the average person.
A huge list of alternatives to Google products. Privacy tips, tricks, and links. Browser addons, replacements, alternatives, risk overviews and *-eyes hazard ratings.
System tampering detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet. Ostensibly shuts the whole thing down but can be configured to do other stuff. I don't know how reliable it is, haven't audited the code yet. Written in Python.
A site that documents the practice of letterlocking - cleverly folding, cutting, and sealing letters in the 17th century for tamper evidence and security.
A website that offers email addresses that are only good for ten (10) minutes at a time, though you can opt to extend their lifetime to 100 minutes if you keep refreshing it.
A FOSS utility for investigating Tor hidden services. Searches for configuration errors and information leaks. Written in golang. In the AUR. CLI tool but the Onionscan Correlation Lab is a webapp that lets you analyze the data visually.
4220 links, including 281 private