How to preserve fundamental rights on the internet: a guide

The Spanish government's crackdown in Catalonia has shown that the entire population – not only Catalan people – needs tools to guarantee their fundamental rights. Here's a practical guide to securing them online. 

29 September 2017
lead lead

Students of university and secondary school strike demonstrating in favour of the referendum of Catalonia due to take place on October 1. September 28, 2017, Barcelona, Spain. Nur Photo/PA Images. All rights reserved. 

#Democracy – Rights and freedoms protected by the people: recent events in Catalonia as a case study

How-to guide

What is happening in Spain these days in relation to the situation in Catalonia is a very significant milestone in the defence of freedoms and rights around the world in the digital age.

The reaction of the Spanish government has clearly shown that the entire population – not only those living in Catalonia – needs to have tools to guarantee their fundamental rights (natural rights guaranteed per se which do not depend on any government) independently of any unjustified or arbitrary tutelage.

Many international institutions like the United Nations, recommend this after the Snowden revelations, emphasizing that knowledge and use of digital tools by everyone to ensure their privacy, freedom of expression and access to information are essential and the only way to guarantee fundamental rights in the face of increasing state-approved mass surveillance.

The acceleration of events in Catalonia has finally made the whole Spanish population aware of this situation and many citizens are now ready to begin use these tools. These days, in contrast to situations such as those experienced in Turkey, for example, even the Catalan institutions are publicising the necessary tools. They have finally agreed to assign, distribute and share responsibility for protection of freedoms, thus beginning to endorse what we see as the embryo of what has to be a democracy that is up to the requirements of the digital age.

Xnet fights to empower people because we believe that a real democracy resides in the fact of making it possible for each and every person to access the necessary tools to monitor their institutions and to be autonomous in their judgments and, consequently, in protecting their rights and freedoms. We have worked tirelessly to teach people how to use these tools and to deactivate the gross attempts to criminalise them by powers that require people to be at their mercy.

From this point of view, what is happening these days is of historic significance and hopeful. This acceleration towards a greater degree of democracy and strength for civil society is taking place spontaneously. But lack of information about some aspects of the digital milieu is exposing people to risks.

Accordingly, and in order to facilitate this process of co-responsibility wherever necessary, Xnet has summarized the most important information in a basic How-to guide.

Our How-to guide is also associated with the indispensable work in defence of rights and legal freedoms carried out by several organisations in the campaign #SomDefensores.

Basic how-to guide for preserving fundamental rights on the Internet

Xnet has prepared this technical guide with tips and tools addressed to activists, journalists and citizens whose fundamental freedoms and rights on the Internet are being restricted by state powers or authoritarian governments.

It is important to read the recommendations, download and learn to use these tools before a possible arbitrary blocking of the Internet, or the concerted attempt to access the private data of citizens, etc. Because, once it starts, it will be too late.

  1. Arbitrary website and application blocking

  2. Mobile Device Encryption

  3. Hosting: privacy and security

  4. Messaging, VOIP, email and file sharing privately and securely

  5. Blocking of messaging applications

  6. Internet shutdown

  7. More

This guide is to be improved collectively; if you have any corrections write to: info[at] /Clave pública PGP.

#Arbitrary website and application blocking

Arbitrary Internet blockages occur primarily – but not only – when a government intentionally disrupts access to websites, mobile applications or electronic communication services to censor or control what people say or do.

Internet access is essential for the exercise of our freedoms and should be considered in itself a fundamental right [#KeepItOn]. Partially or totally blocking Internet access is a common practice in countries with authoritarian regimes, for example, to avoid access to certain types of content (in opposition to the regime, LGTBI, etc.) and to exercise control over conversations and the flow of information.

How to access websites that are arbitrarily censored or blocked in a particular connection/location: Tor and VPN

Both the Tor network and a VPN allow access to websites and applications that have been improperly blocked in a region or country, surfing the Internet as if it was being done from another geographical location.

For example, if a country blocks access to Twitter, people can use the Tor network or a VPN to access the social network as if their connection was coming from another point or country where these arbitrary restrictions on freedom of expression and access to information are not happening.

Moreover, navigation in both cases is encrypted – in a “closed envelope”, so that it can only be read by the sender and receiver.

Tor for Android: Orbot

Screen Shot 2017-09-29 at 10.36.03 PM.png

Screen Shot 2017-09-29 at 10.36.18 PM.png

Screen Shot 2017-09-29 at 10.36.30 PM.png

  1. Download Orbot
  2. Open and start Orbot
  3. You are connected to the Tor network
  4. Click on “Apps in VPN mode”. You do not need to install Orfox, you can use your usual browser. 
  5. Select the Apps that you cannot access because of the blocking 
  6. You can also select your browser, other apps, or everything (increases battery consumption) 
  7. Verify that you can access the blocked App with Orbot. If you have also activated it for your browser, check it works here 
  8. To add more Apps to Orbot go to Settings
  9. and there ‘Select Apps’.


Tor for iPhone: Onion Browser

There is no iPhone application that allows use of the Tor network for any application installed on the device. However, with Onion Browser you can access websites and the web version of arbitrarily blocked applications. 

Screen Shot 2017-09-29 at 10.38.33 PM.png

  1. Download Onion Browser for iPhone; open it and select ‘connect to Tor’
  2. From here you can access blocked websites and blocked web apps

Tor for PC: Tor Browser

Download Tor browser for Linux / MacOS / Windows.

How to install and use Tor in Linux / MacOS / Windows.

Video: How to use Tor in PCs created for the launching of the Whistleblowing Platform against corruption of the City Hall of Barcelona (CAT):


A VPN (Virtual Private Network) allows your data to travel through an encrypted connection, or a kind of tunnel, before heading out to the open Internet, to connect to the Web from another location.

The easiest and fastest application to install in order to activate a VPN connection is Bitmask, which is also free. At the moment it is only available for Android phones and Linux PCs, although its version for the MacOs iPhone is about to be released and, in the not too distant future, its Windows version. However, there are many very low-cost payment services that offer VPN connection for all types of devices – see below for information on Internet services that ensure the preservation of privacy and information.

It is advisable to have both Tor and VPN options. If traffic is blocked through Tor, you can then use the VPN, and vice versa.

Screen Shot 2017-09-29 at 10.39.40 PM.png

Screen Shot 2017-09-29 at 10.39.50 PM.png

Screen Shot 2017-09-29 at 10.39.59 PM.png

  1. Download and install Bitmask
  2. Open it. Select a provider. Any one of the 3 works
  3. Register (or initiate session)
  4. Choose a username and password
  5. After logging in, start Bitmask
  6. Accept connection via VPN
  7. You will see an icon in the top bar indicating that you are logged in
  8. Display the top notification menu to check the status of Bitmask or turn it off

For a correct configuration of the VPN connection, it is important to ensure that you are not suffering ‘DNS leakage’. Otherwise you will not be able to overcome the blockade and will reveal your connection data. In the page DNS Leak test you can find out how to test it and how to solve it.

Screen Shot 2017-09-29 at 10.40.07 PM.png

  1. Visit the page DNS Leak test 
  2. Perform a test without the VPN connected. Look at the data.
  3. Connect the VPN and perform another test. If the data is the same you have a DNS leak. The same page explains how to solve it.

#Mobile Device Encryption

Encrypting devices, especially mobile phones, is essential to maintain the privacy of personal data should they be lost or stolen. This is why most smartphones have installed by default tools which, in a few simple steps, encrypt the entire device, and it always is recommended to protect the privacy of data, accounts, contacts and user information.

Mobile Device Encryption: Example with Android

Screen Shot 2017-09-29 at 10.42.17 PM.png

Screen Shot 2017-09-29 at 10.42.28 PM.png

  1. 'Additional settings'">
  2. The device encryption option is in ‘Settings’ -> ‘Additional settings’ 
  3. ‘Privacy’
  4. ‘Device Encryption’ 
  5. In order to encrypt the device you need to have the battery charged and it should also be plugged in
  6. When loaded and connected you can encrypt. The process is long and if interrupted you could lose data, so it is advisable to make a previous backup.

In general, as a good practice, you should not store unnecessary information in your devices, delete periodically. Even though you may be sure that everything you have is absolutely legal, remember that it is not you but the power who decides what is legal and what isn’t, and what today is legal might not be so tomorrow in the event that the regime becomes authoritarian. Deleting and emptying the bin is not enough, you have to use specific tools that overwrite the data several times. More information and tools to do it here (a backdoor was discovered in CCleaner for Windows that has already been patched: always download the latest version).

Note to the Spanish State: In the case that security forces confiscate someone’s device because this person is under investigation, he or she has the right not to reveal encryption keys, PIN, unlock pattern, password or similar data, in accordance with the right not to testify against oneself (Criminal Procedure Law Art. 118 h & Art. 588 septies b 2; as explained in this document to the Secretariat of State of the European Union).

# Hosting: privacy and security

The censorship of websites by authoritarian governments can happen at a deeper level when, instead of blocking access to the web through the network, the page is entirely closed down either by intervening in the servers or by seizing the domain. In this case, tools like Tor or a VPN will not help.

In order to foil such attempts (or create a mirror-copy of the same website – in a secure hosting if the web has already been censored), citizens living in authoritarian states should not choose a server within the territory of their country. It is necessary to search and choose countries where the legal framework offers strong guarantees regarding freedom of expression and information about where to locate the hosting.

Neither should they register the domain of a website susceptible to be censored with Top Level Domains of their own country. It is easier for a government to intervene in its TLD than in others such as .net, .eu or .is. In Spain, we have recently experienced a preposterous example of this, unprecedented in the European Union, with the TLD .cat:

Screen Shot 2017-09-29 at 10.46.46 PM.png

  1. Fundació Puntcat < href="">denounces to ICANN the inordinate action of the courts assaulting its headquarters 
  2. Internet Society statement on internet blocking measures in Catalonia, Spain

Finally, to protect your privacy and security (to avoid spam, spam, or other harassment), you should acquire your domain in registration services that offer strong legal security, eg Njalla.

Many domain registrars undertake not to publish the owner’s data and to manage the requests they receive themselves, whether they are requests from buyers, individuals, or authorities and institutions. This type of service is known as private whois.

The importance of this requirement can be understood by entering, for example, or (for domains ending in .es) and looking for any web.

A file will appear in which all data will be output. If the person who owns the website has not used a provider which had undertaken to protect their privacy, his or her information will be published, and anyone from anywhere can see it:

  1. REGISTRANT CONTACT (note that providing inaccurate or outdated information is punishable )
  2. Name: …
  3. Organisation: …
  4. Street: …
  5. City: …
  6. State: …
  7. Postal Code: …
  8. Phone: …
  9. Email: …

If the owner has taken the functional and customary measure that the requests are to be managed by the provider (has activated the private whois service), the data will be forwarded to the service provider. The provider will notify the owner if someone has searched or required it. It is important that the provider should assure you in the contract of the deadlines within which it provides you with the information. The more ethical providers who are respectful of the rights of their users usually offer deadlines between the requirement and the communication of your data to those who require it if you have not answered.

Not all domains agree because not all domains are managed in the same way. Generic domains, .com, .net, .biz, .org, etc… are managed by ICANN – the Internet Corporation for Assigned Names and Numbers, the leading Internet governance body, and this organization is the one which permits the use of domains that can have recourse to Whois protection. The .es domains, on the other hand, are managed by and these domains do not allow hiding the data of the registry of users who want to acquire an .es domain.

# Messaging, VOIP, email and file sharing privately and securely

Massive surveillance of what we do and say on the Internet (and in all electronic communications) by governments has been clearly revealed thanks to Snowden’s revelations. Below are some tips to help defend privacy against these practices using encryption tools.


To protect the privacy of your communications always use messaging applications that have end-to-end encryption by default. We strongly recommend using Signal (Android | iPhone), an end-to-end encrypted messaging app whose use is easy and intuitive, and recommended by Snowden himself. Among other popular messaging applications, Whatsapp has also integrated end-to-end encryption in all communications by default (however, Facebook has already shared user data with WhatsApp and the social network, so Signal is still the best choice). Telegram, has an encryption option but is not active by default.

It is important to note that, even though they are encrypted end-to-end, the above applications are associated with the user’s mobile number. Hence, even if the communication is encrypted (a third person cannot see the content) it is not anonymous and the identity of the sender and receiver, as well as connection and geolocation times are known.

Video calls – VOIP

You can make encrypted calls and video calls over the Internet with Signal (and Whatsapp) to a contact. MeetJitsi allows you to make group video calls. Calls and video calls through Skype, Hangouts or others do not sufficiently protect the privacy of your communications.

Encrypted email

In the case of e-mail, it is important to know that all e-mail sent and received can be read (and is actually processed) by the mail service providers. Some of them, when required by the authorities, show little concern about the privacy and legal security of their customers/users. We do not recommend the use of services like gmail, yahoo, hotmail, etc. In any case, it should be known that sending any email without encryption is almost the same as sending a letter in an open envelope. In order to protect the right to confidentiality of communication, it is possible to use encryption with PGP. This allows you to ensure the privacy of communications and files sent via email. This guide from Security in a Box explains how to use email with PGP with Linux | MacOS | Windows.

Again in this case, the communication is encrypted in terms of content, but not anonymous.

What does this mean? It means that, even if we do not indicate our name, or we use an email account in which our identity does not appear, or a throw-away one, all electronic communication leaves a trail , the so-called IP address, which is a unique address assigned to each device on the network and indicating the point from which a communication has been made. In addition, the sender, recipient, and subject of the message as well as other “metadata” of the mail are not encrypted and indicate who receives it, when, and other data. Therefore, the real anonymity possible for transferring files and information can only be achieved through the Tor network, because this communication is not made from point A to point B but the connection passes through several intermediate nodes within the Tor network, none of which knows the origin and destination at the same time. Obviously, accessing our regular account of gmail or any social network through the Tor network will reveal the identity even if the IP address is hidden.

One example of how to deliver information privately and securely is the XnetLeaks mailbox for reporting corruption, based on Globaleaks and accessible through Tor.

# Blocking of messaging applications

Alternatives to private and public communication in case Signal or Whatsapp messaging applications and social networks are blocked.

FireChat: for Android and iPhone

FireChat is a messaging application that allows communication between devices and publishing in public forums between nearby devices through mesh-networks.

  • Public rooms: like #PublicRoom1, are open chats in which all messages reach all participants in the chat. All messages are public and not encrypted. The creators of FireChat recommend that people should not use personal data and that they should be careful with personal information that is shared in the public chats.

  • Private Messages: Private messages are encrypted and can only be viewed by the sender and the recipients, which can be one or several.

This is the application used by demonstrators in the yellow umbrella revolution in Hong Kong when their communications were blocked. Julian Assange recommends it (along with Briar) for this type of situation.

Download FireChat for Android or iPhone:

How to use FireChat:

#Internet shutdown

In the extreme case of a shutdown in which the Internet connection is completely cut off, as happens in situations of great repression, there are applications that allow communication between mobile devices, even without connection.

Briar: for Android

Briar is an open source messaging application designed for activists, journalists and anyone else who needs a secure, easy and robust way to communicate. Unlike traditional messaging tools such as email, Twitter or Telegram, Briar is not based on a central server: messages are synchronized directly via p2p between users’ devices.

If the Internet is down, Briar can synchronize messages via Bluetooth or Wi-Fi, and thus maintain the flow of information in case of crisis. The devices must be able to connect between them so the maximum distance in the case of Bluetooth is 70 meters approx. or a little more in the case of Wi-Fi depending on its scope. In the case of groups or forums, the larger the group the greater the reach of p2p synchronization.

With Internet connection, Briar is synchronized through the Tor network, protecting users from surveillance.

Download Briar:

Howt to use Briar:


This guide contains a series of basic guidelines for preserving your rights on the Internet. For greater security and privacy on the Internet, visit Security in a Box:

The manual “Zen and the art of making tech work for you” to read more about creating and managing online identities as well as about building and maintaining secure spaces online and in physical life:

MyShadow to read and learn about tools and methodologies to understand and change your digital shade: https://myshadow. org/en

Finally in terms of basic logistics, it is recommended that you should always leave home with your devices charged and, if possible, with external batteries for greater autonomy.

Had enough of ‘alternative facts’? openDemocracy is different Join the conversation: get our weekly email


We encourage anyone to comment, please consult the oD commenting guidelines if you have any questions.
Audio available Bookmark Check Language Close Comments Download Facebook Link Email Newsletter Newsletter Play Print Share Twitter Youtube Search Instagram WhatsApp yourData