Threat profiles
Not everyone faces the same risks. Choose the profile closest to your situation — you get a concrete checklist tailored to the steps that matter most for you.
By risk level
the normal user
You use your phone, laptop, and internet daily. You're not an activist or journalist, but you don't want companies knowing everything about you. What are your real risks and what do you do about them?
privacy conscious
You want to move away from Google and Big Tech. Not because you have something to hide, but because your data belongs to you. How do you start de-Googling without throwing everything overboard?
student or employee
You use work or study equipment alongside personal devices. How do you protect yourself and your employer, and how do you keep work and personal life separate?
small business owner
As a freelancer or small business owner, you're responsible for client data, invoices, and business continuity. What are your obligations and how do you protect yourself?
journalist or activist
You work with sensitive sources, participate in political or social activism, or share information that powerful parties dislike. How do you protect yourself and your sources?
high risk and full OpSec
You operate in an environment where a mistake has serious consequences. Full operational security, compartmentalisation, and minimal digital footprint.
By your situation
Apply alongside your risk level — these profiles add context, not replace it.
Family and Children
As a parent you want to protect your children online without undermining their autonomy. As a teenager you're building your digital identity for the first time. Two perspectives, one goal: safe and aware online.
Healthcare Worker
As a doctor, psychologist, or social worker you have legal obligations around patient data and professional secrecy. How do you protect patient data and communicate securely in healthcare?
Lawyer, Notary or Politician
Professional secrecy, legal privilege, and targeted threats. What does this mean for your digital security as a lawyer, notary, or political official?
Stalking or Domestic Abuse
When the threat comes from close by — an ex-partner, family member, or someone you know — the threat model is fundamentally different. The adversary may already have access to your devices. Here's how to respond.
IT Professional and Sysadmin
You manage other people's systems. That makes you an attractive target — not for your own data, but for the access you have. Your personal security is organisational security.