Privacy tools
- VPN
- Warrant canaries explained
- Tails
- Tor - The Onion Router
- E-mail providers that emphasize privacy
- Cryptography
- Encrypted Instant Messagers
- File sharing
- Cloud storage
- Password managers (be skeptical)
- U2F second factor authentication (not mentioned)
- Key disclosure law
- File encryption software - Veracrypt