- Introduction
- Chapter 1: Pirvacy Myths
- Chapter 2: Threat Modeling
- Chapter 3: Operational Security
- Chapter 4: Privacy Essentials
- Chapter 5: All About Encryption
- Chapter 6: Fingerprints and Footprints
- Chapter 7: Going Anonymous
- Chapter 8: Moving Forward
- Appendix A: Technical Details
- Appendix B: Additional Resources
- Acknowledgements
- Donations and Support