Personal Guidance

Find Your Privacy Path

Everyone's privacy needs are different. Discover curated recommendations based on your situation and risk tolerance.

Family Guardian

Privacy-Conscious Parent

Protecting children and personal information without overwhelming technical complexity.

Top Concern
Child Safety Online
Recommended
Family Protection Bundle

Small Business Owner

Entrepreneur

Balancing productivity with client data protection on a realistic budget.

Top Concern
Client Data Security
Recommended
Business Essentials Pack

High-Risk Professional

Journalist/Activist

Advanced protection for journalists, activists, and sensitive work environments.

Top Concern
Source Protection
Recommended
Maximum Security Suite

Privacy Beginner

New to Privacy

Starting your privacy journey with simple, effective first steps.

Top Concern
Where to Start
Recommended
Getting Started Kit

Not Sure Which Path Fits You?

Take our quick 2-minute assessment to get personalized recommendations based on your specific needs and concerns.

Family Protection Bundle

Comprehensive privacy protection for families with children, balancing safety with ease of use.

Parents and guardians managing family devices and online activities
Beginner to Intermediate

ProtonVPN

VPN

Family-friendly VPN with easy setup and reliable connection protection

HighEasy
Setup Time: 15-20 minutes

Configuration Screenshot

ProtonVPN

Why Recommended

Free tier available, Swiss privacy laws, simple interface suitable for all family members

Guidance for Family Protection

Focus on setting up automatic VPN connection on children's devices. Use parental device management to ensure VPN stays enabled. The free tier provides 1 device connection, consider upgrading to Plus plan ($4.99/month) for up to 10 devices to cover the whole family.

Configuration Tips
  • Enable "Always-On VPN" in device settings to ensure constant protection
  • Use the "Quick Connect" feature for fastest server selection
  • Set up separate profiles for each family member if using paid plan
  • Enable kill switch to prevent data leaks if VPN disconnects
Step-by-Step Setup
  1. 1Create a Proton account for the family
  2. 2Install ProtonVPN on all family devices (computers, tablets, phones)
  3. 3Enable VPN connection before browsing
  4. 4Set up automatic connection on children's devices
Common Issues & Solutions
  • VPN slowing down connection: Try different server locations or use "Fastest" server option
  • Apps not working with VPN: Enable split tunneling to exclude specific apps
  • Children disabling VPN: Use device restrictions/parental controls to prevent VPN from being turned off

Signal

Messaging

End-to-end encrypted messaging for secure family communication

HighEasy
Setup Time: 10-15 minutes

Configuration Screenshot

Signal

Why Recommended

Simple interface like regular texting, completely private, no ads or tracking

Guidance for Family Protection

Create separate group chats for different purposes: one for daily family coordination, another for sensitive topics. Teach children that Signal is for private family matters. Enable disappearing messages (1 week timer) for financial or medical discussions.

Configuration Tips
  • Enable "Screen Security" to prevent screenshots of sensitive messages
  • Set disappearing messages timer (1 week recommended for family chats)
  • Use "Note to Self" feature for private reminders and notes
  • Enable registration lock with a PIN for account security
Step-by-Step Setup
  1. 1Download Signal app on all family phones
  2. 2Verify phone numbers for each family member
  3. 3Create family group chat
  4. 4Enable disappearing messages for sensitive conversations
  5. 5Set up Signal as default SMS app (optional)
Common Issues & Solutions
  • Messages not delivering: Check internet connection and ensure recipient has Signal installed
  • Can't find contacts: Grant Signal permission to access contacts in phone settings
  • Notification issues: Check notification permissions and battery optimization settings

Proton Drive

Cloud Storage

Encrypted cloud storage for family photos and documents

MediumEasy
Setup Time: 20-30 minutes

Configuration Screenshot

Proton Drive

Why Recommended

End-to-end encryption, easy sharing within family, 5GB free tier

Guidance for Family Protection

Create a shared "Family" folder for photos and documents everyone needs access to. Keep sensitive documents (medical records, financial info) in your private folder and share selectively. The 5GB free tier is good for important documents; upgrade to 200GB ($3.99/month) if storing lots of photos.

Configuration Tips
  • Organize files into folders: "Family Photos", "Important Documents", "School Records", etc.
  • Use sharing links with passwords for sensitive documents
  • Enable two-factor authentication on Proton account
  • Set up automatic mobile photo backup to save memories securely
Step-by-Step Setup
  1. 1Create Proton account (can use same as VPN)
  2. 2Install Proton Drive on family computers
  3. 3Upload important family documents and photos
  4. 4Share folders with family members as needed
  5. 5Set up automatic photo backup from phones
Common Issues & Solutions
  • Running out of storage: Upgrade to paid plan or use for important files only
  • Slow upload speeds: Upload during off-peak hours or check internet connection
  • Can't access shared files: Ensure family members have Proton accounts and correct permissions

Firefox with Privacy Extensions

Browser

Privacy-focused browser with parental control options

HighModerate
Setup Time: 30-45 minutes

Configuration Screenshot

Firefox with Privacy Extensions

Why Recommended

Strong tracking protection, customizable for different family members, supports parental controls

Guidance for Family Protection

Set up individual profiles for each family member with age-appropriate settings. For children: enable strict tracking protection, install ad blockers, and use parental control extensions like "BlockSite". For teens: allow more freedom but keep tracking protection enabled. Teach family members why these protections matter.

Configuration Tips
  • Create separate Firefox profiles: Settings > Manage Profiles > Create New Profile
  • Install uBlock Origin from Firefox Add-ons (blocks ads and trackers)
  • Enable "Strict" Enhanced Tracking Protection in Privacy settings
  • Use Firefox Sync to backup bookmarks and settings
  • Set up Firefox Containers to separate different activities
Step-by-Step Setup
  1. 1Download and install Firefox on all devices
  2. 2Install uBlock Origin extension for ad blocking
  3. 3Install Privacy Badger for tracker blocking
  4. 4Configure separate Firefox profiles for each family member
  5. 5Enable Enhanced Tracking Protection (Strict mode)
  6. 6Set up parental controls for children's profiles
Common Issues & Solutions
  • Websites breaking: Temporarily disable Strict mode for that site or whitelist it
  • Extensions not working: Check Firefox version compatibility and update if needed
  • Profiles not syncing: Ensure Firefox Sync is enabled and internet connection is stable

DuckDuckGo

Search Engine

Private search engine that doesn't track you

MediumEasy
Setup Time: 5-10 minutes

Configuration Screenshot

DuckDuckGo

Why Recommended

Free, no search history tracking, family-safe results, simple to use

Guidance for Family Protection

Set DuckDuckGo as default on all family devices and enable Safe Search. Teach children that DuckDuckGo doesn't track their searches like Google does. The !bang shortcuts make it easy to search specific sites directly.

Configuration Tips
  • In Firefox: Settings > Search > Default Search Engine > DuckDuckGo
  • Enable "Safe Search" for family devices (filters adult content)
  • Learn useful !bangs: "!w" for Wikipedia, "!yt" for YouTube, "!a" for Amazon
  • Use "!g" if you need Google results for a specific search
Step-by-Step Setup
  1. 1Set DuckDuckGo as default search engine in Firefox
  2. 2Install DuckDuckGo Privacy Browser on mobile devices
  3. 3Teach family members to use !bangs for specific site searches
  4. 4Enable safe search settings for children
Common Issues & Solutions
  • Results not as good as Google: Try rephrasing your search or use "!g" to search Google when needed
  • Safe Search not working: Check DuckDuckGo settings and ensure it's enabled
  • Keeps reverting to Google: Re-set default search engine in browser settings

Bitwarden

Password Manager

Family password manager for secure credential storage

HighModerate
Setup Time: 45-60 minutes

Configuration Screenshot

Bitwarden

Why Recommended

Free family organization plan, easy to use, teaches good password habits

Guidance for Family Protection

The family plan ($40/year) allows 6 users with shared vaults. Create a "Family Shared" collection for streaming services, WiFi passwords, etc. Keep individual banking and email passwords in personal vaults. Teach children to use strong, unique passwords for everything.

Configuration Tips
  • Use the password generator for all new accounts (20+ characters recommended)
  • Enable auto-fill in browser extension settings for convenience
  • Set up emergency access for trusted family member
  • Use collections to organize passwords by category
  • Enable two-factor authentication with authenticator app (not SMS)
Step-by-Step Setup
  1. 1Create Bitwarden family organization account
  2. 2Install Bitwarden extension in browsers
  3. 3Install Bitwarden mobile apps
  4. 4Import existing passwords from browsers
  5. 5Create shared family vault for common accounts
  6. 6Set up individual vaults for each family member
  7. 7Enable two-factor authentication on Bitwarden
Common Issues & Solutions
  • Forgot master password: Use emergency access feature (set up beforehand) or account recovery
  • Auto-fill not working: Check browser extension permissions and reload the page
  • Syncing issues: Manually sync in app settings or check internet connection

Need help implementing this pack? Check out our Data Escape Guide for detailed tutorials.

View Implementation Guide

Business Essentials Pack

Cost-effective privacy tools that protect client data while maintaining productivity and compliance.

Small business owners, freelancers, and entrepreneurs
Intermediate

Mullvad VPN

VPN

Business-grade VPN with strong privacy and no account requirements

HighModerate
Setup Time: 30-45 minutes

Configuration Screenshot

Mullvad VPN

Why Recommended

Anonymous account creation, flat pricing, excellent for remote work security

Guidance for Business Essentials

Mullvad costs €5/month per device with no bulk discounts, but the privacy is unmatched. Create a VPN policy document for your team explaining when to use it (always for remote work, public WiFi, accessing client data). Consider one account per team member for flexibility. The anonymous account creation means no business information is tied to your VPN usage.

Configuration Tips
  • Enable "Always-on VPN" and "Kill Switch" in settings for maximum protection
  • Use split tunneling to allow local network access while VPN is active
  • Configure WireGuard protocol for best performance (faster than OpenVPN)
  • Set up port forwarding if needed for specific business applications
  • Use multihop (double VPN) for extra sensitive work
Step-by-Step Setup
  1. 1Purchase Mullvad account anonymously (cash or cryptocurrency)
  2. 2Install Mullvad on all business devices
  3. 3Configure always-on VPN for remote workers
  4. 4Set up split tunneling for local network access
  5. 5Document VPN usage policy for team
Common Issues & Solutions
  • VPN blocking certain websites: Use split tunneling or try different server locations
  • Slow connection speeds: Switch to WireGuard protocol or choose geographically closer servers
  • Can't access local network resources: Configure split tunneling to exclude local IP ranges
  • Payment issues: Mullvad accepts cash by mail, cryptocurrency, or bank wire transfer

Tresorit

Cloud Storage

Swiss-based encrypted cloud storage with business collaboration features

HighModerate
Setup Time: 2-3 hours

Configuration Screenshot

Tresorit

Why Recommended

End-to-end encryption, GDPR compliant, team collaboration tools, client file sharing

Guidance for Business Essentials

Tresorit Business starts at $20/user/month (1TB storage). It's pricier than Dropbox but provides true end-to-end encryption - even Tresorit can't access your files. Perfect for client data, contracts, financial records. Use encrypted links to share files with clients securely. The GDPR compliance is crucial if you work with EU clients.

Configuration Tips
  • Create folder structure: Client Projects, Internal Documents, Team Resources
  • Use "Tresors" (encrypted folders) for different departments or projects
  • Set up encrypted links with passwords and expiration dates for client sharing
  • Enable two-factor authentication for all team members
  • Configure admin controls to manage team access and permissions
Step-by-Step Setup
  1. 1Sign up for Tresorit business plan
  2. 2Install Tresorit on all team computers
  3. 3Migrate existing business files from current cloud storage
  4. 4Set up shared folders for team collaboration
  5. 5Create secure links for client file sharing
  6. 6Configure access permissions and expiration dates
  7. 7Train team on secure file sharing practices
Common Issues & Solutions
  • Slow sync speeds: Tresorit encrypts locally before upload, which takes time - be patient with large files
  • Team members can't access shared folders: Check permissions and ensure they've accepted the invitation
  • Client can't open encrypted link: Ensure they have the password and link hasn't expired
  • High cost: Start with essential team members only, expand as budget allows

ProtonMail Business

Email

Encrypted email service with custom domain support

HighModerate
Setup Time: 3-4 hours

Configuration Screenshot

ProtonMail Business

Why Recommended

End-to-end encryption, professional custom domains, calendar and contacts included

Guidance for Business Essentials

ProtonMail Business costs $8/user/month. The custom domain makes you look professional while keeping client communications private. Emails to other ProtonMail users are automatically encrypted. For non-Proton recipients, use "Encrypt for Outside" feature with password protection. The included calendar and contacts are fully encrypted too.

Configuration Tips
  • Add SPF, DKIM, and DMARC records to your domain for better deliverability
  • Set up catch-all address to receive emails sent to non-existent addresses
  • Use ProtonMail Bridge to access email from desktop clients (Outlook, Thunderbird)
  • Enable address verification to prevent phishing
  • Create email aliases for different business functions (sales@, support@)
Step-by-Step Setup
  1. 1Sign up for ProtonMail Business plan
  2. 2Configure custom domain (yourcompany.com)
  3. 3Create email accounts for team members
  4. 4Set up email forwarding from old accounts
  5. 5Import existing contacts and calendar
  6. 6Configure email clients (optional)
  7. 7Update email signatures and business communications
Common Issues & Solutions
  • Emails going to spam: Configure SPF/DKIM/DMARC records properly and warm up your domain
  • Can't send to certain recipients: Some corporate email systems block encrypted email - use password-protected messages
  • Domain configuration issues: Follow ProtonMail's DNS setup guide carefully or contact support
  • Bridge not syncing: Restart Bridge application and check firewall settings

Signal for Teams

Messaging

Encrypted messaging for secure team communication

MediumEasy
Setup Time: 15-20 minutes

Configuration Screenshot

Signal for Teams

Why Recommended

Free, end-to-end encrypted, supports group chats and file sharing

Guidance for Business Essentials

Signal is completely free and perfect for internal team communication. Use it instead of Slack or WhatsApp for sensitive business discussions. Create groups for different projects or departments. The disappearing messages feature is great for temporary coordination that doesn't need to be archived. Encourage clients to use Signal for confidential communications.

Configuration Tips
  • Create separate groups: "Team General", "Project A", "Client Communications"
  • Set disappearing messages to 1 week for routine chats, 1 day for sensitive info
  • Use @mentions to get specific team members' attention
  • Pin important messages for easy reference
  • Enable "Screen Security" to prevent screenshots
Step-by-Step Setup
  1. 1Have all team members install Signal
  2. 2Create team group chats for different projects
  3. 3Set up disappearing messages for sensitive discussions
  4. 4Use Signal for client communications when possible
  5. 5Establish team communication protocols
Common Issues & Solutions
  • Team members not receiving messages: Check internet connection and ensure Signal is updated
  • Disappearing messages causing confusion: Set longer timers for important info or don't use for critical business records
  • File sharing limits: Signal has file size limits - use Tresorit for large files
  • No desktop notifications: Check notification settings and ensure Signal desktop is running

Bitwarden Business

Password Manager

Team password manager with secure credential sharing

HighModerate
Setup Time: 1-2 hours

Configuration Screenshot

Bitwarden Business

Why Recommended

Affordable business plan, secure team password sharing, compliance features

Guidance for Business Essentials

Bitwarden Business costs $5/user/month. Create collections for different access levels - not everyone needs access to everything. Use it for social media accounts, client portals, software licenses, and shared services. The event logs help you track who accessed what. Require 2FA for all team members to prevent unauthorized access.

Configuration Tips
  • Create collections: "Admin Access", "Team Shared", "Client Accounts", "Social Media"
  • Require 2FA for all team members (use authenticator app, not SMS)
  • Set master password requirements (minimum 12 characters)
  • Enable event logs to track password access
  • Use password generator with 20+ characters for all new accounts
Step-by-Step Setup
  1. 1Create Bitwarden business organization
  2. 2Invite team members to organization
  3. 3Create collections for different access levels
  4. 4Migrate business passwords to shared vaults
  5. 5Set up two-factor authentication requirements
  6. 6Configure password policies and security settings
  7. 7Train team on password best practices
Common Issues & Solutions
  • Team members locked out: Use emergency access or admin password reset features
  • Auto-fill not working: Check browser extension permissions and reload page
  • Forgot master password: No recovery possible - emphasize importance of remembering it
  • Sync delays: Manually sync in app settings or check internet connection

Firefox with Business Extensions

Browser

Privacy-focused browser for business use

MediumModerate
Setup Time: 45-60 minutes

Configuration Screenshot

Firefox with Business Extensions

Why Recommended

Strong tracking protection, customizable for business needs, supports enterprise policies

Guidance for Business Essentials

Firefox with container tabs is perfect for managing multiple client accounts. Create a container for each client - this keeps cookies and logins separate so you can be logged into multiple accounts simultaneously. The privacy protections prevent ad networks from tracking your business research and client work.

Configuration Tips
  • Install Multi-Account Containers extension to separate client work
  • Use different containers for each client to prevent cookie/tracking crossover
  • Enable "Strict" Enhanced Tracking Protection
  • Install uBlock Origin and Privacy Badger for ad/tracker blocking
  • Set up Firefox Sync with strong password for bookmark/settings backup
Step-by-Step Setup
  1. 1Deploy Firefox across team devices
  2. 2Install uBlock Origin and Privacy Badger
  3. 3Configure Firefox Sync for team members
  4. 4Set up container tabs for different clients
  5. 5Enable Enhanced Tracking Protection
  6. 6Configure business-specific bookmarks and settings
Common Issues & Solutions
  • Websites breaking in Strict mode: Temporarily disable for that site or use Standard mode
  • Container tabs confusing: Start with 2-3 containers, add more as you get comfortable
  • Extensions not syncing: Firefox Sync doesn't sync extensions - reinstall on each device
  • Performance issues: Disable unused extensions and clear cache regularly

Need help implementing this pack? Check out our Data Escape Guide for detailed tutorials.

View Implementation Guide

Maximum Security Suite

Advanced protection for journalists, activists, and professionals handling sensitive information.

High-risk professionals, journalists, activists, researchers
Advanced

Mullvad VPN

VPN

Maximum privacy VPN with anonymous account creation

HighAdvanced
Setup Time: 1-2 hours

Configuration Screenshot

Mullvad VPN

Why Recommended

No personal information required, accepts cash payments, independently audited, no logs

Guidance for Maximum Security

Mullvad is essential for high-risk work. Pay with cash mailed anonymously or cryptocurrency. Your account number is your only identifier - memorize it and store it securely offline. Use multihop connections for sensitive work (routes through 2 VPN servers). Never use the same server for different projects. In hostile environments, use bridge mode to hide VPN usage from ISP. Always enable kill switch to prevent accidental data leaks.

Configuration Tips
  • Enable "Always-on VPN" and "Kill Switch" - never allow unprotected connections
  • Use multihop (double VPN) for maximum security: Settings > Advanced > Multihop
  • Configure WireGuard with custom port for better censorship resistance
  • Use bridge mode in restrictive countries to hide VPN usage
  • Rotate servers regularly - don't use the same server for extended periods
  • Combine with Tor Browser for maximum anonymity when needed
Step-by-Step Setup
  1. 1Purchase Mullvad account anonymously (cash or cryptocurrency)
  2. 2Install Mullvad on all devices
  3. 3Enable kill switch to prevent data leaks
  4. 4Configure multi-hop connections for extra security
  5. 5Use bridge mode in restrictive networks
  6. 6Regularly rotate VPN servers
  7. 7Combine with Tor for maximum anonymity when needed
Common Issues & Solutions
  • Multihop very slow: This is normal - you're routing through 2 servers. Use only for sensitive work
  • VPN detected/blocked: Use bridge mode or try different protocols (WireGuard vs OpenVPN)
  • Kill switch blocking all internet: This is intentional - reconnect to VPN to restore access
  • Can't receive cash payment confirmation: Check Mullvad website with your account number after 2 weeks

Signal with Security Hardening

Messaging

Military-grade encrypted messaging with advanced security features

HighAdvanced
Setup Time: 45-60 minutes

Configuration Screenshot

Signal with Security Hardening

Why Recommended

Open source, end-to-end encrypted, disappearing messages, sealed sender, no metadata collection

Guidance for Maximum Security

Signal is your primary secure communication tool. Use a dedicated device if possible. ALWAYS verify safety numbers with contacts - this prevents man-in-the-middle attacks. Enable disappearing messages with short timers (1 hour or less) for all conversations. Use sealed sender to hide metadata. Never screenshot sensitive messages. Consider using separate Signal accounts (different phone numbers) for different contexts. In extreme cases, use Signal through Tor for IP protection.

Configuration Tips
  • Enable Registration Lock with strong PIN (Settings > Account > Registration Lock)
  • Verify safety numbers with ALL contacts before sensitive conversations
  • Enable disappearing messages by default: Settings > Privacy > Disappearing Messages (1 hour or less)
  • Disable message previews: Settings > Notifications > Show > Name only
  • Enable "Screen Security" to prevent screenshots
  • Use "Sealed Sender" for metadata protection (hides sender from Signal servers)
  • Enable "Relay Calls" to hide IP address during calls
Step-by-Step Setup
  1. 1Install Signal on dedicated secure device
  2. 2Enable registration lock with strong PIN
  3. 3Verify safety numbers with all contacts
  4. 4Enable disappearing messages by default (short duration)
  5. 5Disable message previews and notifications content
  6. 6Use sealed sender for metadata protection
  7. 7Enable screen security to prevent screenshots
  8. 8Set up separate Signal accounts for different contexts
Common Issues & Solutions
  • Safety number changed: Contact's device changed or app reinstalled - verify new number before continuing
  • Messages disappearing too quickly: Adjust timer to longer duration or disable for specific conversations
  • Can't verify safety number: Must be done in person or via trusted secondary channel (not Signal itself)
  • Sealed sender not working: Ensure both parties have it enabled and are using latest Signal version

Tresorit or Sync.com

Cloud Storage

Zero-knowledge encrypted cloud storage

HighAdvanced
Setup Time: 1-2 hours

Configuration Screenshot

Tresorit or Sync.com

Why Recommended

End-to-end encryption, zero-knowledge architecture, secure file sharing

Guidance for Maximum Security

Tresorit and Sync.com both offer zero-knowledge encryption - even they can't access your files. For maximum security, encrypt critical files with VeraCrypt before uploading (double encryption). Use separate accounts for different projects to compartmentalize data. When sharing files, use encrypted links with strong passwords sent via separate channel (Signal). Set short expiration times. Never store encryption keys or passwords in the cloud. Maintain offline encrypted backups of critical files on external drive stored securely.

Configuration Tips
  • Use anonymous email (ProtonMail) for account creation
  • Enable 2FA with authenticator app (Aegis or andOTP on mobile)
  • For ultra-sensitive files: encrypt with VeraCrypt BEFORE uploading to Tresorit
  • Use encrypted links with strong passwords and short expiration (24-48 hours)
  • Never share master password - use encrypted links for sharing
  • Maintain offline encrypted backups on external drive
Step-by-Step Setup
  1. 1Create account with anonymous email
  2. 2Enable two-factor authentication
  3. 3Install desktop and mobile apps
  4. 4Encrypt sensitive files before upload (additional layer)
  5. 5Use secure sharing links with passwords and expiration
  6. 6Never store encryption keys in the cloud
  7. 7Maintain offline encrypted backups of critical files
Common Issues & Solutions
  • Very slow upload: Zero-knowledge encryption happens on your device - be patient with large files
  • Recipient can't open encrypted link: Ensure password sent via separate secure channel
  • Forgot master password: No recovery possible with zero-knowledge encryption - emphasize importance
  • High cost: Tresorit is expensive but necessary for high-risk work - budget accordingly

ProtonMail with PGP

Email

Encrypted email with additional PGP encryption layer

HighAdvanced
Setup Time: 2-3 hours

Configuration Screenshot

ProtonMail with PGP

Why Recommended

End-to-end encryption, Swiss privacy laws, Tor access, no IP logging

Guidance for Maximum Security

ProtonMail is Swiss-based with strong privacy laws. Create account via Tor for anonymity. Use hardware key 2FA (YubiKey). For non-ProtonMail contacts, use PGP encryption - generate key pair and publish public key. Verify all contacts' keys via trusted channel. Use email aliases to compartmentalize different work. Access via Tor .onion address when needed. Never access from compromised networks without VPN. ProtonMail encrypts subject lines only between Proton users - use generic subjects with external contacts.

Configuration Tips
  • Create account via Tor Browser for maximum anonymity
  • Enable 2FA with hardware key (YubiKey) - most secure option
  • Generate PGP key pair: Settings > Encryption & Keys > Export Public Key
  • Publish PGP public key on keyserver for external contacts to find
  • Enable address verification to prevent phishing
  • Use email aliases for different contexts (journalism@, activism@)
  • Access via Tor .onion address when maximum anonymity needed
Step-by-Step Setup
  1. 1Create ProtonMail account via Tor
  2. 2Enable two-factor authentication with hardware key
  3. 3Generate and publish PGP key for external communications
  4. 4Configure email client with PGP for non-Proton contacts
  5. 5Use ProtonMail Bridge for desktop email clients
  6. 6Enable address verification for all contacts
  7. 7Set up email aliases for different contexts
  8. 8Never access via compromised networks without VPN
Common Issues & Solutions
  • PGP setup complex: Use ProtonMail's built-in encryption for Proton-to-Proton, PGP only for external contacts
  • Recipient can't read PGP email: They need PGP-compatible email client - use ProtonMail password-protected message instead
  • Tor access very slow: This is normal - patience required for maximum anonymity
  • Hardware key not working: Ensure YubiKey is properly inserted and browser supports WebAuthn

Tor Browser

Browser

Anonymous browsing through the Tor network

HighAdvanced
Setup Time: 30-45 minutes

Configuration Screenshot

Tor Browser

Why Recommended

Maximum anonymity, circumvents censorship, no tracking possible

Guidance for Maximum Security

Tor Browser is essential for anonymous research and accessing censored information. NEVER login to personal accounts via Tor - this defeats anonymity. Use only for anonymous browsing and accessing .onion sites. Don't maximize window (fingerprinting). Set security to "Safest" level (disables JavaScript) for sensitive work. Use bridges in hostile environments to hide Tor usage from ISP. Combine with VPN for extra protection (VPN -> Tor). Create new identity frequently. Never download files via Tor unless absolutely necessary.

Configuration Tips
  • Download ONLY from official torproject.org website
  • Verify GPG signature of download to ensure authenticity
  • NEVER maximize browser window - keeps fingerprint consistent
  • Set security level to "Safest" for maximum protection (disables JavaScript)
  • Use .onion sites when available - they're only accessible via Tor
  • Use bridges in restrictive countries: Settings > Tor > Use a Bridge
  • Create new identity frequently: Click onion icon > New Identity
Step-by-Step Setup
  1. 1Download Tor Browser from official source
  2. 2Verify download signature
  3. 3Use Tor Browser for all sensitive research
  4. 4Never maximize window (fingerprinting protection)
  5. 5Disable JavaScript for maximum security (when possible)
  6. 6Use .onion sites when available
  7. 7Never login to personal accounts via Tor
  8. 8Use bridges in restrictive countries
Common Issues & Solutions
  • Very slow browsing: Normal - traffic routes through 3 servers worldwide. Patience required.
  • Many websites broken: Set security level to "Standard" or "Safer" instead of "Safest"
  • CAPTCHAs everywhere: Tor exit nodes often flagged as suspicious - solve CAPTCHAs or use different exit node
  • Tor blocked in my country: Use bridges to circumvent blocking - get bridge addresses from torproject.org

Bitwarden with Hardware Key

Password Manager

Password manager with hardware security key protection

HighAdvanced
Setup Time: 1-2 hours

Configuration Screenshot

Bitwarden with Hardware Key

Why Recommended

Open source, end-to-end encrypted, supports hardware keys for 2FA

Guidance for Maximum Security

Bitwarden with hardware key 2FA is essential. Use anonymous email for account. Purchase YubiKey ($45) - physical key required for access. Generate 25+ character passwords for all accounts. Store master password offline in secure location - if you lose it, no recovery possible. Export encrypted backups regularly. Consider using separate Bitwarden accounts for different contexts (personal, work, activism). For maximum control, self-host Bitwarden on your own server. Never use SMS 2FA - hardware key only.

Configuration Tips
  • Use anonymous email (ProtonMail) for Bitwarden account
  • Purchase YubiKey 5 NFC ($45) - works with computers and phones
  • Enable hardware key as primary 2FA: Settings > Two-step Login > Security Key
  • Generate 25+ character passwords for critical accounts
  • Store master password offline in secure location (safe, safety deposit box)
  • Export encrypted backup monthly and store offline
  • Consider self-hosting Bitwarden for maximum control
Step-by-Step Setup
  1. 1Create Bitwarden account with anonymous email
  2. 2Purchase YubiKey or similar hardware security key
  3. 3Enable hardware key as primary 2FA method
  4. 4Generate strong unique passwords for all accounts
  5. 5Store master password offline in secure location
  6. 6Enable emergency access for trusted contact
  7. 7Export encrypted backup regularly
  8. 8Use separate password manager for different contexts
Common Issues & Solutions
  • Lost hardware key: This is why you set up emergency access - trusted contact can grant access after waiting period
  • Forgot master password: No recovery possible - emphasize importance of storing securely offline
  • Hardware key not recognized: Ensure browser supports WebAuthn and key is properly inserted
  • Self-hosting complex: Use official Bitwarden cloud unless you have technical expertise

Tails OS (for highest risk)

Operating System

Amnesic live operating system for maximum security

MediumAdvanced
Setup Time: 2-3 hours

Configuration Screenshot

Tails OS (for highest risk)

Why Recommended

Leaves no trace, routes all traffic through Tor, includes security tools

Guidance for Maximum Security

Tails OS is for highest-risk situations. Boot from USB for sensitive work - leaves no trace on computer. All traffic routes through Tor automatically. Use for: sensitive communications, handling leaked documents, accessing censored information, protecting sources. Configure persistent storage for PGP keys and essential files. Never connect to personal accounts from Tails. Maintain separate Tails USBs for different projects. When done, remove USB and restart - computer returns to normal with no trace of your work. Tails is used by journalists worldwide for source protection.

Configuration Tips
  • Download Tails from official tails.net website
  • Verify download signature - critical for security
  • Use Etcher or Rufus to create bootable USB (8GB minimum)
  • Configure persistent storage for PGP keys and important files
  • All internet traffic automatically routes through Tor
  • Tails includes: Tor Browser, encrypted email, secure file deletion
  • Computer returns to normal when you remove USB and restart
Step-by-Step Setup
  1. 1Download Tails OS and verify signature
  2. 2Create bootable USB drive
  3. 3Boot from Tails for sensitive work
  4. 4Configure persistent storage for essential files
  5. 5Use Tails for all high-risk communications
  6. 6Never connect to personal accounts from Tails
  7. 7Maintain separate Tails USB for different contexts
Common Issues & Solutions
  • Computer won't boot from USB: Change boot order in BIOS/UEFI settings
  • Persistent storage not working: Must be configured on first boot - follow Tails setup wizard
  • Very slow performance: Tails runs from USB and routes through Tor - slower than normal OS
  • WiFi not working: Some WiFi adapters not supported - use ethernet or different adapter

Need help implementing this pack? Check out our Data Escape Guide for detailed tutorials.

View Implementation Guide

Getting Started Kit

Simple, effective privacy improvements for those new to digital privacy.

Privacy beginners, students, general users starting their privacy journey
Beginner

ProtonVPN Free

VPN

Free VPN service to protect your internet connection

HighEasy
Setup Time: 10-15 minutes

Configuration Screenshot

ProtonVPN Free

Why Recommended

Completely free, no ads, unlimited bandwidth, easy to use

Guidance for Getting Started

ProtonVPN Free is the perfect starting point. It's completely free forever, no credit card needed. Just click "Quick Connect" and you're protected. Use it whenever you're on public WiFi or want to browse privately. The free version is limited to 3 countries but has unlimited bandwidth. If you like it, you can upgrade later for more features ($4.99/month), but the free tier is great for getting started.

Configuration Tips
  • Just click "Quick Connect" - the app chooses the best server for you
  • Use VPN whenever you're on public WiFi (coffee shops, airports, hotels)
  • The free tier includes 3 countries and unlimited bandwidth
  • Green shield icon means you're protected
  • To disconnect, click the "Disconnect" button
Step-by-Step Setup
  1. 1Create free Proton account at protonvpn.com
  2. 2Download ProtonVPN app for your device
  3. 3Install and open the app
  4. 4Click "Quick Connect" to connect to VPN
  5. 5Use VPN when on public WiFi or browsing sensitive content
Common Issues & Solutions
  • VPN slowing down internet: Free tier can be slower during peak times - this is normal
  • Can't connect: Try different server or check internet connection
  • Limited to 3 countries: Upgrade to Plus plan for access to 60+ countries
  • Only 1 device on free tier: Upgrade to Plus for 10 devices or use on your most important device

Firefox Browser

Browser

Privacy-focused web browser

HighEasy
Setup Time: 15-20 minutes

Configuration Screenshot

Firefox Browser

Why Recommended

Free, blocks trackers by default, easy switch from Chrome

Guidance for Getting Started

Firefox is just like Chrome but respects your privacy. It blocks trackers automatically and doesn't sell your data to advertisers. The switch is painless - it imports all your bookmarks and passwords from Chrome. Just enable "Strict" tracking protection and install uBlock Origin extension to block ads. That's it! You're now browsing privately without changing how you use the internet.

Configuration Tips
  • During installation, Firefox will offer to import bookmarks from Chrome/Edge - say yes
  • Enable Strict tracking protection: Settings > Privacy & Security > Enhanced Tracking Protection > Strict
  • Install uBlock Origin: Menu > Add-ons > Search "uBlock Origin" > Add to Firefox
  • Set as default browser: Settings > General > Make Default
  • Firefox looks similar to Chrome - you'll feel right at home
Step-by-Step Setup
  1. 1Download Firefox from mozilla.org
  2. 2Install Firefox on your computer
  3. 3Import bookmarks from your old browser
  4. 4Set Firefox as default browser
  5. 5Enable Enhanced Tracking Protection (Strict)
  6. 6Install uBlock Origin extension for ad blocking
Common Issues & Solutions
  • Some websites look broken: Temporarily disable Strict mode for that site (shield icon in address bar)
  • Missing Chrome extensions: Most Chrome extensions have Firefox versions - search Firefox Add-ons
  • Bookmarks didn't import: Manually import from Chrome: Bookmarks > Show All > Import
  • Slower than Chrome: Clear cache and disable unused extensions

DuckDuckGo

Search Engine

Private search engine that doesn't track you

MediumEasy
Setup Time: 5 minutes

Configuration Screenshot

DuckDuckGo

Why Recommended

Free, no search history tracking, clean results without filter bubble

Guidance for Getting Started

DuckDuckGo is like Google but doesn't track your searches or build a profile on you. The results are great for everyday searches. Just set it as your default search engine and use it normally - no learning curve! If you ever need Google results for something specific, just type "!g" before your search. You'll be surprised how good DuckDuckGo is - you probably won't need Google anymore.

Configuration Tips
  • In Firefox: Settings > Search > Default Search Engine > DuckDuckGo
  • DuckDuckGo works just like Google - type your search in the address bar
  • Use "!g" before your search if you need Google results for something specific
  • Learn !bangs: "!w" for Wikipedia, "!yt" for YouTube, "!a" for Amazon
  • No account needed - just start searching
Step-by-Step Setup
  1. 1Go to duckduckgo.com
  2. 2In Firefox settings, set DuckDuckGo as default search
  3. 3Start searching privately
  4. 4Install DuckDuckGo Privacy Browser on phone (optional)
Common Issues & Solutions
  • Results not as good as Google: Try rephrasing your search or use "!g" to search Google when needed
  • Missing local results: DuckDuckGo has local search - try adding your city name
  • Keeps reverting to Google: Re-set default search engine in Firefox settings
  • Want image search: DuckDuckGo has image search - click "Images" tab

Bitwarden Free

Password Manager

Free password manager to create and store strong passwords

HighEasy
Setup Time: 30-45 minutes

Configuration Screenshot

Bitwarden Free

Why Recommended

Free forever, unlimited passwords, works on all devices, easy to use

Guidance for Getting Started

Bitwarden is a game-changer. You only need to remember ONE strong master password, and Bitwarden remembers all your other passwords. It generates super strong passwords for you (like "X9$mK2@pL5#nQ8") that are impossible to hack. The browser extension auto-fills passwords, making it easier than remembering them yourself. Start by letting Bitwarden save your passwords as you login to sites. Then gradually update old weak passwords using Bitwarden's generator. It's free forever with unlimited passwords.

Configuration Tips
  • Choose a strong master password you can remember - you'll need it every time
  • When creating new accounts, click Bitwarden icon and use "Generate Password"
  • Bitwarden will offer to save passwords when you login - click "Save"
  • Enable 2FA with authenticator app (Authy or Google Authenticator)
  • The browser extension auto-fills passwords - just click the login field
Step-by-Step Setup
  1. 1Create free account at bitwarden.com
  2. 2Install Bitwarden extension in Firefox
  3. 3Install Bitwarden app on phone
  4. 4Let Bitwarden generate strong passwords for new accounts
  5. 5Save passwords as you login to sites
  6. 6Enable two-factor authentication on Bitwarden
  7. 7Gradually update old weak passwords
Common Issues & Solutions
  • Forgot master password: No recovery possible - write it down and store securely
  • Auto-fill not working: Click the Bitwarden icon in the password field
  • Too many passwords to update: Start with important accounts (email, banking) then do others gradually
  • Syncing between devices: Bitwarden syncs automatically - give it a minute

Signal

Messaging

Private messaging app for texts and calls

MediumEasy
Setup Time: 10 minutes

Configuration Screenshot

Signal

Why Recommended

Free, easy to use like regular texting, completely private

Guidance for Getting Started

Signal is like your regular texting app but completely private. No ads, no tracking, no data collection. It works with your phone number just like regular texts. Start by messaging one friend who has Signal, then gradually invite others. The interface is familiar - you'll know how to use it immediately. Use it for sensitive conversations (medical, financial, personal) that you don't want companies reading.

Configuration Tips
  • Signal looks and works exactly like your regular texting app
  • Messages to other Signal users are automatically encrypted
  • You can also send regular SMS texts through Signal
  • Use disappearing messages for sensitive conversations (tap contact name > Disappearing messages)
  • Signal also does voice and video calls - completely private
Step-by-Step Setup
  1. 1Download Signal app from app store
  2. 2Verify your phone number
  3. 3Allow contacts access to find friends on Signal
  4. 4Start messaging friends who have Signal
  5. 5Invite important contacts to join Signal
  6. 6Use Signal for sensitive conversations
Common Issues & Solutions
  • Friends don't have Signal: Invite them! Signal can also send regular SMS to non-Signal users
  • Messages not delivering: Check internet connection - Signal needs data or WiFi
  • Battery drain: Signal uses more battery than regular SMS - this is normal for encrypted apps
  • Can't find contacts: Grant Signal permission to access contacts in phone settings

Privacy Settings Review

Account Security

Review and update privacy settings on major platforms

HighEasy
Setup Time: 1-2 hours

Configuration Screenshot

Privacy Settings Review

Why Recommended

Free, immediate impact, reduces data collection

Guidance for Getting Started

This is the easiest high-impact privacy improvement. Spend 1-2 hours going through your major accounts and tightening privacy settings. You'll be shocked how much data Google and Facebook collect by default. Turn off location history, web activity tracking, and ad personalization. Make your social media accounts private. Review app permissions on your phone - does your flashlight app really need access to your contacts? This costs nothing and immediately reduces data collection.

Configuration Tips
  • Google: Visit myaccount.google.com > Data & Privacy > Turn off location history, web activity, YouTube history
  • Facebook: Settings > Privacy > Limit who can see your posts to "Friends"
  • Instagram: Settings > Privacy > Private Account (only approved followers see your posts)
  • Phone: Settings > Apps > Review permissions for each app, revoke unnecessary access
  • Disable ad personalization: Google, Facebook, Instagram all have this in privacy settings
Step-by-Step Setup
  1. 1Visit Google Privacy Checkup and minimize data collection
  2. 2Review Facebook privacy settings and limit audience
  3. 3Check Instagram privacy and switch to private account
  4. 4Review app permissions on phone and revoke unnecessary access
  5. 5Disable ad personalization on major platforms
  6. 6Opt out of data broker sites (optional but recommended)
Common Issues & Solutions
  • Settings keep reverting: Some platforms reset settings after updates - review periodically
  • Features stop working: Some features require data collection - decide what's worth the privacy trade-off
  • Too overwhelming: Start with Google and Facebook, do others later
  • Can't find settings: Use search function in settings or Google "how to [platform] privacy settings"

Need help implementing this pack? Check out our Data Escape Guide for detailed tutorials.

View Implementation Guide