Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page

How we put this guide together

Previous8 - GlossaryNextFinal words

Last updated 7 years ago

CHAYN created a set of privacy guides after several interactions with real-life survivors of domestic violence who want to prevent their abusers from finding them, while reading scores of articles on and the doxxing of women online, as well as from our very own experiences as women who use the internet. Technology and the internet opens us up to new worlds and provides us information at the touch of a button, but it can also open us up to security risks. The stark reality is that there are people in the world who may be able to do you harm using the very same technology. These people are not extreme hackers nor do they have highly advanced IT skills - they are using the very same tools that you do. This means that you can also learn how to protect yourself using these tools.

CHAYN believes in survivor-led design, which means we listen to survivors, and request them to give us as much feedback as possible. They have also worked on this guide, checked it for accuracy, and told us their real-life experiences to ensure we provide the right solutions.

Using existing online privacy guides tailored for women as inspiration and for reference, CHAYN volunteers began building this guide by crowdsourcing content. There was a lot to cover - technology is vast - but we were determined to build an exhaustive easy-to-understand guide that could benefit all internet users. After we had a Version 1 ready, we sent it out to security experts as well as survivors of domestic violence, and people who have experienced stalking and other forms of cyber harassment to give us their feedback. We then assessed their comments and added information to the guide, making it as inclusive and exhaustive as possible.

Then we roped in Securikitty to help make the guide more user friendly, reminding readers when to take breaks and encouraging them to stay strong through the process of protecting themselves.

Gamergate