For part two of our series on Internet privacy, we talk about playing in the big leagues: How dissidents, journalists, whistleblowers and others with tough adversaries can protect themselves using tools like Tor and Tails.
Links to resources we mention:
We don’t just talk about security. If you have a security problem you need to solve, we can help. Reach us at firstname.lastname@example.org or @SecCocktailHour on Twitter.