<h2class="display-4 mt-4">The guide to restoring your online privacy.</h2>
<h5class="mt-5">Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.</h5>
<h5class="mt-2">First, you need to make a plan.</h5>
<pclass="mt-2">Trying to protect <strong>all</strong> your data from <strong>everyone</strong> all the time is impractical, expensive, and exhausting. But, don't worry! Security is a process, and by thinking ahead you can put together a plan that's right for <strong>you</strong>. Security isn't just about the tools you use or the software you download. Rather, it begins with understanding the unique threats you face, and how you can counter them.</p>
<p>This process of identifying threats and defining countermeasures is called <strong>threat modeling</strong>, and it forms the basis of every good security and privacy plan.</p>
<ahref="/threat-modeling/"class="btn btn-primary mt-2">Learn More About Threat Modeling <iclass="far fa-fw fa-arrow-circle-right"></i></a>
<p>The devices, software, and services that will protect your privacy highly depend on your use case, workflow, and threat model. But, if you don't know where to get started, we've chosen some recommended tools to get you going :)</p>