This document provides an overview of topics related to digital self-defense, including how to protect digital tracks, encrypt disks and use VPNs/VPS, Tor anonymity software, Open Whisper Systems apps, and the Tails privacy-focused operating system. The author has experience with software development and an interest in penetration testing and privacy/encryption tools. Specific techniques are discussed such as avoiding cookie tracking, using single sign-on cautiously due to exploits, encrypting disks for data security if a device is lost or stolen, setting up a VPN for secure connections on public WiFi, and how Tor anonymizes web traffic through multiple random relay nodes.