Skip to content

🛡️ Digital Force Protection Guide

👽 Looking for a quick privacy and cyber security guide on a single page? Quick Guide here

🩺‼️ Is it too late for prevention - Do you need an incident response guide? Response Guide


📋 Checklists


📘 Guides

Privacy & Security

GuideDescription
💰 Donation GuidePrivacy-preserving donation methods
🕵🏼‍♂️ Removal and Opt-OutRemove your data from data brokers
📷 Location Tracking PreventionDetecting and preventing surveillance
🛜 Router Hardening GuideSecure your home network
📧 Email Security GuideHarden your email accounts
🖇️ Privacy Guide for BusinessBusiness privacy practices

Authentication & VPN

GuideDescription
🔑 MFA GuideMulti-Factor Authentication setup
🌐 VPN GuideVirtual Private Network recommendations

Virtualization

GuideDescription
💻 Virtual Environment GuideOverview of virtualization
🖥️ VirtualBox GuideVirtualBox setup and usage
🖥️ VMWare GuideVMWare setup and usage
🐳 Docker ContainersDocker for DFP
📱 Android Device EmulatorAndroid virtual devices

Communication

GuideDescription
💬 Element Messenger GuideSecure messaging with Element
🪙 Monero GuidePrivacy-focused cryptocurrency

Additional Resources

IrregularChat Community Wiki