Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Online Privacy and Security Toolkit

A guide to developing good privacy and security practices online. Adapted from UW-Bothell, Nicole Gustavsen and Myra Waddell.

All icons were created by VectorsMarket at www.FlatIcon.com, and are covered under the Flaticon Basic License.

Get A VPN (Virtual Private Network)

Encryption Options

Tor Browser Options

What is Tor? "The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked."

Cryptocurrency and Blockchain