## Zines

Anonymity_Security_screen.pdf
A_Civilians_Guide_to_Direct_Action.pdf
A_Field_Guide_to_Wheatpasting_imposed.pdf
Affinity_Groups_imposed.pdf
Alternatives_to_EMS_imposed.pdf
An_Activists_Guide_to_Basic_First_Aid_imposed.pdf
Anonymity_Security_imposed.pdf
Artificial_Intelligence_and_Machine_Learning_imposed.pdf
Basic_Blockading_imposed.pdf
Beyond_the_Screens_the_Stars_imposed.pdf
Bounty_Hunters_and_Child_Predators-_Inside_the_FBI_Entrapment_Strategy_imposed.pdf
Bounty_Hunters_and_Child_Predators-_Inside_the_FBI_Entrapment_Strategy_screen.pdf
Building_Consentful_Tech_imposed.pdf
Building_imposed.pdf
Community_Defense_Toolkit_imposed.pdf
Delete_Your_Facebook_imposed.pdf
Delete_Your_Facebook_screen.pdf
Diceware_List.pdf
Digital_Security_for_Activists_imposed.pdf
Digital_Security_for_Activists_screen.pdf
Direct_Action_Survival_Guide_imposed.pdf
DIY_Armor_imposed.pdf
DIY_Doula-_Self_Care_Before_During_and_After_Your_Abortion_screen.pdf
Doxcare_imposed.pdf
Encrypted_Messaging_for_Anarchists.pdf
Fedizine_imposed.pdf
Fog_Reveal_Article.pdf
For_an_Anarchist_Radio_Relay_imposed.pdf
Getting_Into_Fights_with_Data_Centres_screen.pdf
Graffitips_screen.pdf
GrapheneOS_for_Anarchists_imposed.pdf
Grindr_Holistic_Security_Guide_screen.pdf
Hack_Back_print.pdf
Hack_Back_screen.pdf
How_Not_to_Blow_Up_a_Pipeline_imposed.pdf
How_to_Defend_Yourself_During_a_Police_Investigation_screen.pdf
How_to_Set_Up_a_Burner_Phone_imposed.pdf
How_to_Submit_an_Anonymous_Communique_imposed.pdf
How_to_Survive_Jail_imposed.pdf
How_to_Survive_Jail_screen.pdf
Iffy_Books_DIY_Faraday_Shield_Zine_imposed.pdf
Iffy_Books_DIY_Faraday_Shield_Zine_screen.pdf
Iffy_Books_Exiftool_print.pdf
Iffy_Books_pdfbook2_print.pdf
Iffy_Books_Steganography_for_Everyone_Zine_imposed.pdf
Iffy_Books_Steganography_for_Everyone_Zine_screen.pdf
Infosec_101_for_Activists_screen.pdf
Inhabit-_Instructions_for_Autonomy_imposed.pdf
Its_Time_to_Build_Resilient_Communities_imposed.pdf
Kill_the_Cop_in_Your_Pocket_imposed.pdf
Lets_Destroy_the_Cameras.pdf
Linux_Essentials_imposed.pdf
Linux_Lab-_EZ_Command_Line_Encryption_imposed.pdf
Linux_Lab-_EZ_Command_Line_Encryption_screen.pdf
London_Calling_imposed.pdf
Magic_Actions_imposed.pdf
Make_Your_Electronics_Temper-Evident_imposed.pdf
Memory_Loss_imposed.pdf
Not_Liking_Someone_Doesnt_Mean_Theyre_a_Cop_imposed.pdf
Qubes_OS_for_Anarchists_imposed.pdf
Raise_the_Black_Flag-_A_Short_Introduction_to_Digital_Piracy_screen.pdf
Recipes_for_Disaster_screen.pdf
Remove_Identifying_Metadata_from_Files_imposed.pdf
Secrets_and_Lies_imposed.pdf
Security_and_Countersurveillance_screen.pdf
Security_Culture-_A_Handbook_for_Activists_imposed.pdf
Security_Culture-_Building_Relationships_of_Trust_and_Care_imposed.pdf
Send_Files_Securely_with_Magic_Wormhole_imposed.pdf
Send_Files_Securely_with_Magic_Wormhole_screen.pdf
Smash_All_Phones_imposed.pdf
Social_Insurrectionary_Methods-_Some Brief_Excited_Thoughts_from_a_Philly_Anarchist_screen.pdf
Software_and_Anarchy_screen.pdf
Stay_Calm_imposed.pdf
Strong_Encryption_with_a_10-Sided_Die_Zine_screen.pdf
Tails_Best_Practices_imposed.pdf
Tails_for_Anarchists_imposed.pdf
The_Cloak_and_Dagger_Compendium.pdf
The_Femmes_Guide_to_Riot_Fashion.pdf
The_Gentlepersons_Guide_to_Forum_Spies_imposed.pdf
The_Gentlepersons_Guide_to_Forum_Spies_screen.pdf
The_Invisible_Ground_imposed.pdf
The_PET_Guide_imposed.pdf
The_Struggle_Against_Ghost_Robotics_imposed.pdf
The_Struggle_Against_Ghost_Robotics_screen.pdf
Threat_Library_imposed.pdf
Threat_Modeling_Fundamentals_imposed.pdf
Three_Security_Proposals_imposed.pdf
Turn_Off_Your_Phone_and_Other_Basic_Digital_Security_Strategies_imposed.pdf
Understanding_the_RICO_Charges_in_Atlanta_imposed.pdf
We_Are_Being_Doxxed_imposed.pdf
We_Come_to_Bury_ChatGPT_screen.pdf
What_is_Security_Culture_imposed.pdf
What_is_Solarpunk_imposed.pdf
Who_Wrote_That_imposed.pdf
Why_Misogynists_Make_Great_Informants_imposed.pdf