Civic activists often become targets of cyberattacks, phishing, or even physical persecution due to their activities. Protecting personal data is not just a recommendation—it’s a necessity for your safety, as well as the safety of your colleagues and associates. In this article, we’ll explore practical steps to help minimize risks.
1. Use Strong Passwords and Two-Factor Authentication (2FA)
Passwords:
Use unique, complex passwords for each service (e.g., H7$kLm2!qP9^).
Store them in a password manager (Bitwarden, KeePassXC).
2FA:
Enable two-factor authentication on social media, email, and messaging apps.
Use Google Authenticator or Aegis (for Android).
2. Encrypt Communications and Data
Email:
Use services with end-to-end encryption (ProtonMail, Tutanota).
For Gmail/Yahoo, enable PGP (Pretty Good Privacy).
Messengers:
Signal—the most secure option for messaging.
Telegram—only use “Secret Chats” (though Signal is more reliable).
Files and Drives:
Encrypt storage using VeraCrypt (for PCs) or Cryptomator (for cloud storage).
3. Be Cautious on Social Media
Limit Public Information:
Avoid posting exact locations, home addresses, or travel plans.
Remove geotags from photos before sharing.
Pseudonyms and Separate Accounts:
Consider creating a separate profile under a pseudonym for activism.
Avoid linking this profile to your personal life.
4. Secure Your Devices
Antivirus & VPN:
Install a VPN (e.g., ProtonVPN, Mullvad) for anonymous browsing.
Use antivirus software (Malwarebytes, Bitdefender).
Screen Lock:
Set a strong password/PIN on your phone and computer.
On Android, enable device encryption; on iPhone, activate “Lost Mode.”
5. Stay Safe When Communicating with Strangers
Phishing:
Don’t click on suspicious links (even from “known” contacts).
Verify website domains before entering data.
Online Anonymity:
Use the Tor Browser to visit websites without tracking.
For search engines, use DuckDuckGo instead of Google.
Conclusion
Protecting personal data is an ongoing process. The more steps you take, the harder it will be to compromise your digital security. Start with the basics (changing passwords, enabling 2FA), then move on to encryption and anonymity.
Golden rule: Never ignore threats, even if they seem irrelevant to you.









Discussion about this post