privacyguides.org/docs/index.md

2.7 KiB

meta_title template social hide schema
Privacy Guides: Your Independent Privacy and Security Resource home.html
cards_layout
home
navigation
toc
feedback
@context @type @id name url logo sameAs
https://schema.org Organization https://www.privacyguides.org/ Privacy Guides https://www.privacyguides.org/en/about/ https://www.privacyguides.org/en/assets/brand/logos/png/square/pg-yellow.png
https://twitter.com/privacy_guides
https://github.com/privacyguides
https://www.wikidata.org/wiki/Q111710163
https://opencollective.com/privacyguides
https://www.youtube.com/@privacyguides
https://mastodon.neat.computer/@privacyguides
@context @type name url sameAs potentialAction
https://schema.org WebSite Privacy Guides https://www.privacyguides.org/
https://www.wikidata.org/wiki/Q111710163
@type target query-input
SearchAction
@type urlTemplate
EntryPoint https://www.privacyguides.org/?q={search_term_string}
required name=search_term_string

Why should I care?

“I have nothing to hide. Why should I care about my privacy?”

Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't. Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us,== that we are entitled to (without discrimination).

You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. Everyone has something to protect. Privacy is something that makes us human.

:material-book-outline: Why Privacy Matters{ class="md-button md-button--primary" }

What should I do?

First, you need to make a plan

Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But don't worry! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins by understanding the unique threats you face, and how you can mitigate them.

==This process of identifying threats and defining countermeasures is called threat modeling==, and it forms the basis of every good security and privacy plan.

:material-book-outline: Learn More About Threat Modeling{ class="md-button md-button--primary" }