Take control

All devices track and collect data about many aspects of our life. We believe that understanding how our devices work means you can make better decisions to enhance the privacy and security of your entire digital life - Phone + laptop and more - But is should not be overwhelming or confusing . That is why we created Phase 1,2 & 3.

  • Understand how devices, apps, advertising and tech companies collect and track users.

  • Learn how to operate securely in the areas of encrypted messaging, VPNs, web browsers and turning on/off device settings to harden your devices.

  • Working or travelling internationally? Gain the knowledge and skills needed to maximise your safety and security when living or travelling abroad.

Phase 1 Overview

  1. 1
    • Phase 1 - Introduction & overview

      FREE PREVIEW
    • Chapter 1 - The digital world & common security threats

    • Chapter 2 - Device tracking & data collection

    • Chapter 3 - Facing the Giants: Big tech

    • Chapter 4 - Device hardening strategies

    • Chapter 5 - Secure app alternatives

    • Chapter 6 - Introduction to Phase 2

  2. 2
    • Phase 2 - Introduction & overview

      FREE PREVIEW
    • Chapter 1 - Operating System overview: Windows & Mac

    • Chapter 2 - Data collection & tracking

    • Chapter 3 - Laptop detox & security check

    • Chapter 4 - Operational security 101

    • Chapter 5 - Laptop hardening strategies

    • Chapter 6 - Introduction to Linux operating system

  3. 3
    • Phase 3 - Introduction & overview

      FREE PREVIEW
    • Chapter 1 - Threat modelling & risk assessment

    • Chapter 2 - Controlling the home network

    • Chapter 3 - Intermediate mobile device hardening

    • Chapter 4 - Intermediate laptop hardening

    • Chapter 5 - Challenging scenario preparation

    • Chapter 6 - Introduction to Phase 4+