Skip to main content
 
Security Education Companion
A free resource for digital security educators

Welcome to the Security Education Companion! SEC is a resource for people teaching digital security to their friends and neighbors.

If you are new to digital security, want tutorials for privacy-protecting tools, or want translated guides in 11 languages, head to Surveillance Self-Defense (SSD).

Lessons

Putting together a lesson plan for a digital security workshop? Check out our beginner-friendly lesson modules.

Passwords

Duration: 30 minutes - 1 hour
BeginningIntermediate

How to Install Signal

Duration: 1 hour and 30 minutes - 2 hours
BeginningIntermediate

Phishing and Malware

Duration: 1 hour
Beginning

Security News

Want to stay up-to-date with security news? Check out our curated posts from EFF's Deeplinks blog.

Browsers Take a Stand Against Kazakhstan’s Invasive Internet Surveillance

Og kazakhstan surveillanceflag

Yesterday, Google Chrome, Mozilla Firefox, and Apple’s Safari browsers started blocking a security certificate previously used by Kazakh ISPs to compromise their users’ security and perform dragnet surveillance. We encourage other browsers to take similar security measures. Since the fix has been implemented upstream in Chromium, it shouldn’t take long for other Chromium-based browsers, like Brave, Opera, and Microsoft’s Edge, to do the same.

What Happened, and Why Is... Read More

DEEP DIVE: CBP’s Social Media Surveillance Poses Risks to Free Speech and Privacy Rights

Icon free speech 1

The U.S. Department of Homeland Security (DHS) and one of its component agencies, U.S. Customs and Border Protection (CBP), released a Privacy Impact Assessment [.pdf] on CBP’s practice of monitoring social media to enhance the agency’s “situational awareness.” As we’ve argued in relation to other government social media surveillance programs, this practice endangers the free speech and privacy rights of Americans.

“Situational Awareness”

The Privacy Impact...

Read More

Announcing “Gotta Catch 'Em All: Understanding How IMSI-Catchers Exploit Cell Networks”

Whitepaper css

Our phones hold a plethora of important, private information about our personal lives, and it’s not just their contents that matter: the data that our phones exchange with cell towers during basic connection procedures can reveal critical, and private, information. Perhaps you called the suicide prevention hotline from the Golden Gate Bridge; maybe you received a call from the local NRA office while it was having a campaign against gun legislation, and then called your senators and...

Read More
Close tooltip