The Self-Defense BaseCamp is the ideal introduction to the topics of defending privacy and IT security. It is suitable for professional teams, but especially for private individuals and families with a normal working and (school) everyday Internet life. With the knowledge you have acquired, you will protect yourself from cybercrime and learn how to protect yourself from digital mass surveillance and manipulation.
Defend your digital freedom!
WELCOME TO THE SELF DEFENSE BASE CAMP
Start building your knowledge today. The course is free and paves the way for more fun and security when dealing with new media.
And who knows, maybe the topic won’t let you go and you want to continue and get involved with CloudPirat for digital freedom rights.
How can the Basecamp help you?
If you get involved with BaseCamp, you will then understand why protecting your privacy and our digital freedom are more important today than ever. You will consciously recognize when and where you run the risk of revealing too much about yourself and you will make better decisions. You decide consciously whether it’s worth the risk or whether you better keep your hands off one tool or the other. In the toolbox you get CloudPirat’s personal favorites to build up your security either quickly or more technically.
Who is the SelfDefense Basecamp for?
Who is the SelfDefense Basecamp not for?
PART 1: WARM UP
Let’s start training your perception
In three lessons that are as simple as possible, you will learn the basics and connections on the internet.
Take a break You have learned a lot! Treat yourself to something sweet or take a break! 🙂
PART 2: BASIC KNOWLEDGE
Take your time and look around. Observe yourself and train your perception more and more. When you’re ready, take the next step.
Applications for use on your computer, mobile phone, tablet …
PART 3: THE CLOUDPIRAT TOOLBOX
The Privacy Toolbox is the treasure chest for modifying and expanding your applications step-by-step.
The goal in the CloudPirat Privacy Toolbox is to present exactly two options for each application.
The first can usually be used immediately and quickly and offer good basic protection.
The second recommendation usually requires a little more work or IT experience.
The presented solutions are all open source . This means that the program source code has been published by the manufacturer so that a worldwide community of specialists can check the quality and security of an application.
CloudPirat uses all of these solutions itself and regularly compares its recommendations with other international experts and friendly organizations.
Other criteria are:
Depending on your interests and needs, you can decide in which order you read the content.
PART 4: Secure and private on computer and cell phone
Configuration suggestions and behaviors to protect you
Google Pixel & GrapheneOS

GrapheneOS: Private and secure without Google
GrapheneOS is a private, secure mobile operating system and compatible with Android apps. In the article you will find installation help, important settings plus my recommendations for privacy apps from the CloudPirat Privacy Toolbox.
Work in progress

Congratulations!!
You have come to the end of the Self-Defense BaseCamp and have learned a lot. Nobody can fool you that easily anymore!
That’s why the Self-Devense BaseCamp is free
Unfortunately, our governments do not yet see it as their natural task to also protect the digital environment of their citizens. Universities and schools cannot really keep up with the speed of digital changes in society.
Themes like:
- the sovereignty of the individual over his data ,
- the protection of privacy on the Internet ,
- protection against manipulation and data trading by Internet companies or
- self-protection against cyber attacks
could become self-evident learning content, for example, in ethics lessons or in media studies in schools.
Until then, these tasks have to be compensated for by personal initiative and a lot of private commitment.