The Self-Defense BaseCamp is your gateway to privacy protection and IT security. Designed for professional teams, it’s also ideal for individuals and families managing online work and school routines. Acquire essential skills to fortify your defenses against cyber crime and safeguard against digital surveillance and manipulation

Defend your digital Freedom!

WELCOME TO SELF-DEFENSE BASECAMP

Start learning today for free. This course will make using new media more fun and safe for you.

And who knows, you might find the topic so interesting that you’ll want to learn more and even join CloudPirat to help fight for digital freedom.

How does the Self-Defense Basecamp benefit you?

Engaging with BaseCamp will illuminate the critical importance of safeguarding your privacy and digital freedom in today’s world more than ever before. You’ll learn to identify potential risks to your personal information and make informed choices about your online activities. It empowers you to weigh the risks and decide wisely whether to use certain digital tools. The toolbox provides you with CloudPirat’s top picks, offering both straightforward and technical solutions to enhance your security.

Who will enjoy the BaseCamp?

  • People who want to know what happens to their data

  • Teachers and people who want to pass this knowledge on to their students

  • Companies that want to become trusted providers

  • Journalists, OSINT reseatchers, NGOs and all professions in focus

Who might not find the BaseCamp suitable?

  • Advanced and hacktivists (more advanced topics go to the blog)

  • People who don’t feel the need to protect themselves

  • People who prefer to learn offline (just get in direct contact)

  • Unethical companies and people who work for them.

TEIL 1: WARM-UP

Let’s start training your perception

In three lessons that are as simple as possible, you will learn the basics

Warm-Up 1

10 Important Ground Rules For Your Online Life

What shoals and cliffs are out there and what 10 things you should embrace.

Warm-Up 2

Who is Violating Your Privacy?

Who is invading your privacy? Is the internet broken? And is there anything else you can do?

Warm-Up 3

Which Topics Belong to Digital Self-Defense?

Table of contents and explanations of the learning material.

Well done on your progress! Time for a sweet pause or a relaxing break.

PART 2: PRIVACY FUNDAMENTALS

Lesson 1

What is Metadata?

How is metadata created and how can linking and evaluating it lead to mass surveillance?

Lesson 2

Protect Your Identity With Secure Passwords

Why you need an individual, secure password for every (online) account.

Lesson 3

Always Focus on Trusted Providers

How can you recognize them and change your usage behavior?

Take your time and have a look around. Observe yourself and train your perception more and more. When you’re ready, take the next step.

The application toolbox for all your devices – tested, approved and regularly revised.

PART 3: OUR PRIVACY TOOLBOX

The Privacy Toolbox is CloudPirat’s treasure chest brimming with applications to safeguard your digital life.

The objective of the CloudPirat Privacy Toolbox is to provide precisely two options for each application.

The first option typically offers immediate and user-friendly functionality, providing a solid foundation for basic protection.

The second recommendation usually entails a bit more effort or IT expertise.

All presented solutions are open source, signifying that the program’s source code has been made available by the manufacturer, allowing a global community of specialists to assess the quality and security of an application.

CloudPirat utilizes these solutions internally and routinely cross-references its recommendations with other international experts and affiliated organizations.

Additional criteria include:

  • The credibility of the provider

  • The practicality of the solution for everyday digital life

Depending on your interests and needs, you can decide in which order you read the content.

Toolbox 1

The Right Password Manager

Learn here which requirements the use of a password manager should meet.

Toolbox 2

Why Using a VPN?

Using a Virtual Private Network service can help protect your privacy. Here you will learn how to use it, which providers you can trust and that VPN’s are no universal remedy.

Toolbox 3

An Internet Browser that Protects You

Which internet browsers protect your privacy instead of tracking you.

Toolbox 4

Search Engines that Respect Your Privacy

Why should you question the use of search engines like Google, Bing and Yahoo?

Toolbox 5

Instant Messenger – Encrypted and Without Tracking

There is life without WhatsApp.

Toolbox 6

E-mail, Contacts and Calendar in Good Hands

There are popular tools, but there are also specialized providers like mailbox.org where your data is in good and safe hands.

Toolbox 7

Secure Cloud Storage

Cloud” refers to outsourcing and relinquishing security. How can this be addressed?

Toolbox 8

Libre Office vs. Microsoft Office Suite

Write, calculate and present without Microsoft looking over your shoulder.

Toolbox 9

Secure and Private Video Conferencing

What is the problem with Zoom, Teams and Meet? Are there protected video conferencing systems?

PART 4: Ensuring Security and Privacy on Both Computers and Cell Phones

Recommended behaviors, configuration proposals and trusted apps to protect you

Computer & Operating System

Security and Privacy under Windows, macOS and Linux

Recommended behaviors, configuration proposals and trusted apps to protect you.

Mobile Privacy Fundamentals

Mobile Phone Safety – Basic Training

Behaviors and principles for more privacy and IT security in your everyday mobile life.

 The iPhone

Privacy and Security for Your iPhone

Discover a comprehensive, step-by-step configuration guide aimed at enhancing the security and privacy of your iPhone to the fullest extent possible. Additionally, explore my recommendations for privacy apps from the CloudPirat toolbox.

A Privacy Phone

GrapheneOS: Install a Privat and Secure Mobile Phone

Embark on a journey out of the comfort zone to transform your mobile device into a privacy-focused powerhouse by installing GrapheneOS. GrapheneOS is a private, secure mobile operating system compatible with Android apps. In this article, you’ll discover installation assistance, essential settings, and my top recommendations for privacy apps from the CloudPirat Privacy Toolbox.

Still work in progress.

Congratulation!

You have reached the end of the Self-Defence BaseCamp and you have learned a lot. No one can fool you that easily anymore!

And What Happens Next?

If you would like to delve deeper into the topic, have questions, or encounter technical problems when implementing my toolbox recommendations, I am happy to help. The help is free for individuals.

That’s Why BaseCamp is Free

Our governments unfortunately do not yet perceive it as their natural duty to protect the digital environment of their citizens. Universities and schools cannot keep pace with the speed of digital changes in society.

Topics such as:

  • Individual sovereignty over one’s data,
  • Preservation of privacy on the internet,
  • Protection against manipulation and data trading by internet corporations, or
  • Self-protection against cyber attacks

could become standard learning content, for example, in ethics classes or media studies in schools.

Until then, these tasks must be compensated for through self-initiative and a great deal of private commitment.”

Every donation helps,
to gain momentum!