The first step in trying to defend yourself against digital surveillance and censorship is to understand the concept of risk assessment. Risk assessment is the process of deciding what threats you face, how likely and serious they are, and how to prioritize the steps you can take to protect yourself. EFF’s section on risk assessment in Surveillance Self-Defense can help you with this assessment.

2. Beware of Malware

Malware is a catch-all term for computer viruses, worms, trojan horses, keystroke loggers, spyware, rootkits and any other kind of software that makes a computer spy on you or act against your interests.

If a government is able to install malware on the computer you are using, then it doesn't matter what other steps you take: your files and communications will be subject to surveillance.

If you have your own computer, you need to be sure to install security updates and run anti-virus or rootkit scanning software. You also need to understand that these measures only offer limited protection. For one guide to anti-virus and firewall software, see the Tactical Technology Collective's "Security in a Box" guide.

It is important to note that if you are using a shared computer, such as a computer at an Internet cafe or a library, the risk of surveillance by malware may be greater. If you need to use a public computer for sensitive communications, you should use a bootable USB device or CD (such as Incognito) to mitigate the risks posed by malware.

You can use a bootable USB or CD for the most sensitive things you do with your own computer, too.