{"id":504,"date":"2015-07-17T14:57:29","date_gmt":"2015-07-17T05:57:29","guid":{"rendered":"http:\/\/guide.jinbo.net\/security\/?page_id=12"},"modified":"2015-09-11T18:13:17","modified_gmt":"2015-09-11T09:13:17","slug":"references","status":"publish","type":"page","link":"http:\/\/guide.jinbo.net\/digital-security\/references","title":{"rendered":"\ub514\uc9c0\ud138 \ubcf4\uc548\uacfc \uad00\ub828\ud55c \ucc38\uace0 \uc790\ub8cc"},"content":{"rendered":"<section id=\"builder-section-1441962764170\" class=\"builder-section builder-section-first builder-section-text builder-section-last builder-text-columns-1\" style=\"\">\n<div class=\"builder-section-content\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-1441962764170-column-1\">\n<div class=\"builder-text-content\">\n<div class=\"editors-notes\">\n<ul>\n<li><a href=\"https:\/\/ssd.eff.org\/\" target=\"_blank\">EFF, surveillance self-defence<\/a><\/li>\n<li><a href=\"https:\/\/securityinabox.org\/.\" target=\"_blank\">Tactical Technology Collective, Security-in-a-box<\/a><\/li>\n<li><a href=\"http:\/\/frontlinedefenders.org\/digital-security\" target=\"_blank\">Frontline Defenders, Digital Security and Privacy for Human Rights Defenders<\/a><\/li>\n<li><a href=\"https:\/\/www.eff.org\/secure-messaging-scorecard\" target=\"_blank\">EFF, secure messaging scoreboard<\/a><\/li>\n<li><a href=\"http:\/\/en.flossmanuals.net\/bypassing-censorship\/\" target=\"_blank\">FLOSS manuals, HOW TO BYPASS INTERNET CENSORSHIP<\/a><\/li>\n<li><a href=\"https:\/\/www.eff.org\/https-everywhere\" target=\"_blank\">EFF, HPPTs everywhere<\/a><\/li>\n<li><a href=\"http:\/\/www.apc.org\/en\/irhr\/digital-security-first-aid-kit\" target=\"_blank\">APC, Digital Security First-Aid Kit for Human Rights Defenders<\/a><\/li>\n<li><a href=\"https:\/\/freedom.press\/encryption-works\" target=\"_blank\">Freedom of Press Foundation, Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance<\/a><\/li>\n<li><a href=\"https:\/\/encryptallthethings.net\" target=\"_blank\">ACCESS, Encrypt All The Things<\/a><\/li>\n<li><a href=\"https:\/\/letsencrypt.org\/\" target=\"_blank\">Let\u2019s Encrypt<\/a><\/li>\n<li><a href=\"https:\/\/pack.resetthenet.org\/\" target=\"_blank\">Reset The Net, Privacy Pack<\/a><\/li>\n<li><a href=\"http:\/\/slownews.kr\/13142\" target=\"_blank\">\uc2ac\ub85c\uc6b0\ub274\uc2a4 &amp; \ud568\uaed8\ud558\ub294 \uc2dc\ubbfc\ud589\ub3d9, \ub2e4\ub978 \uc778\ud130\ub137\uc774 \uac00\ub2a5\ud558\ub2e4 \uc2dc\ub9ac\uc988<\/a><\/li>\n<li><a href=\"http:\/\/www.boho.or.kr\/\" target=\"_blank\">\ud55c\uad6d\uc778\ud130\ub137\uc9c4\ud765\uc6d0(KISA) \ubcf4\ud638\ub098\ub77c<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>EFF, surveillance self-defence Tactical Technology Collective, Security-in-a-box Frontline Defenders, Digital Security and Privacy for Human Rights Defenders EFF, secure messaging scoreboard FLOSS manuals, HOW TO BYPASS INTERNET CENSORSHIP EFF, HPPTs everywhere APC, Digital Security First-Aid Kit for Human Rights Defenders Freedom of Press Foundation, Encryption Works: How to Protect Your Privacy in the Age of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-builder.php","meta":{"jetpack_post_was_ever_published":false},"categories":[],"tags":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6uv38-88","_links":{"self":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/504"}],"collection":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/comments?post=504"}],"version-history":[{"count":0,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/504\/revisions"}],"wp:attachment":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/media?parent=504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/categories?post=504"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/tags?post=504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}