Learn How to Exit the Surveillance State

Join the top-rated course designed to help overwhelmed, non-techy people learn how to get private and secure online.

Over 50+ lessons

Flexible Schedule, 
Go Your Own Speed

Lifetime Course Membership

Russel Gray

Russel Gray

Marjory Wildcraft

Marjory Wildcraft

John Bush

John Bush

David Wolfe

David Wolfe

Alex Newman

Alex Newman

David Icke

David Icke

Sarah Westall

Sarah Westall

Maria  Zeee

Maria Zeee

+ over 11,000 students!

Big Tech + Big Brother

Without knowing it, we have walked into a “walled garden” of surveillance technology. Big Tech companies like Apple, Microsoft, and Google have successfully marketed their products and services into everyone’s lives. But what most people don’t realize is that their products are constantly gathering information, like your location, your interests, your friends, and where you spend your money. These companies are not just collecting your data to sell you tailored ads. They are the backbone of the surveillance state, as well as things like Central Bank Digital Currencies, Digital IDs, and Social Credit Systems.

Ensure a Legacy of Freedom 
and Liberty

Freedom and liberty cannot exist without privacy. If we fail to protect our privacy, and exit the surveillance state, the globalists will succeed in trapping us into an inescapable surveillance prison. We the people, can come together and prevent this from happening. If we can protect our privacy, support freedom/privacy oriented solutions, the we can ensure a free internet and in turn allow for the most high-tech, freedom-oriented society ever. Big tech is not your only option. But remember this change will not happen without your help.

What future will you choose?

Online privacy is the issue of our century. Through modern technology powerseekers are able to know your location at all times, monitor your interests, determine your political beliefs, track who you are friends with, and know where you store you finances. This list could go on forever, because Big Tech companies are designed to gather as much information on you as possible.
Most people think that this information is just used for “tailored ads” but that couldn’t be any further from the truth. The globalists are creating a surveillance state that will be the backbone for systems like Central Bank Digital Currencies, Digital IDs, and Social Credit Systems. So, is it still possible to reclaim your privacy and protect your freedom?

Yes, it’s entirely possible, and no, you do not have to be tech-savvy to do it.

Many companies, like Apple, advertise “privacy” in their marketing campaigns, when in reality they are not private. This isn’t just big tech companies either, even some “privacy-oriented” tools like DuckDuckGo claim to be private, when they have been caught sharing information with Microsoft, and bragging about intentionally down-ranking what they determine as “mis-information”. Getting private is essential for protecting our freedom and liberty. If you want to get private, you need to have a planned way forward, and you need to know who to trust. That’s exactly why we created Privacy Academy.

Our goal at Privacy Academy is to provide a clear path towards privacy and freedom that is as easy as possible to follow. You do not have to be tech savvy at all to join Privacy Academy. Many of our students are 70+ years old with limited computer knowledge. After many years of teaching, with over 100,000 taught we have mastered the art of teaching privacy for the sake of freedom.

Free TraINING

Top 5 Steps To Exit The Surveillance State & Protect Yourself Online.

Enter your email below sign up for our webinar this Wednesday at 7pm CT.

Privacy Academy made privacy feel approachable instead of overwhelming. I walked away with practical steps I could actually use the same day. Easily one of the most valuable online workshops I’ve attended.

Daniel R.Portland, Oregon

Privacy Academy made privacy feel approachable instead of overwhelming. I walked away with practical steps I could actually use the same day. Easily one of the most valuable online workshops I’ve attended.

Maya L.Toronto, Ontario

I thought I understood privacy until I purchased this membership. The material was current, thoughtful, and incredibly relevant. It changed how I think about my online habits.

Chris T.Austin, Texas

The #1 Obstacle to Online Privacy & Security

For years getting private online was reserved only for the “tech-savvy.” This was a huge problem because privacy is the most essential component in the modern era for protecting your assets and liberty. The goal of Privacy Academy is to be the “knowledge bridge” teaching average, non-techy people how to get private online. At Privacy Academy, we provide a guided path forward with a team of privacy experts ready to help you if you get stuck.

Hackers and Scammers

  • The one simple mindset shift that immediately makes you a hard target – so hackers, scammers and thieves simply give up and go looking for an easier victim.
  • The “pig butchering” scam… how to spot it… and the only way to avoid it.
  • My special “tap on the knee” technique that instantly trains you to see what’s happening around you so you never get sucked into any online con.
  • The “football quiz question” that can help you spot an online scammer before she robs you blind.
  • The “3-Nevers” that make it impossible for you to get fooled into giving up your hard-earned money.
  • The REAL reason hackers go after data from big dumb companies and why corporate carelessness is your problem.
  • The three simple steps you can take today that show any hacker you are a hard target and impossible to scam.
  • How to spot and sidestep phishing scams.
  • The “Hello Grandma” scam and how to spot it – along with the three things you must never do if someone calls you asking for money.
  • The simple trick you can do with your personal computer to make it impossible for malware hacks to work on your machine.
  • The #1 risk most people take that makes you vulnerable to multiple scams at once.

Microphones and Cameras

  • The single best tool you can use to block your camera – and how to care for it so it lasts for years and years. (It’s DIRT cheap and better than more expensive options.)
  • The real reason you cannot take any advice from the FBI or NSA regarding online security. (Do I really need to explain??!)
  • The #1 way to make sure your smart TV isn’t spying on you and harvesting your data and why you must never trust the software – even if it says it’s turned off!
  • The super-sneaky device that blocks your microphones so Big Tech doesn’t even know it’s turned off.
  • The single best piece of cheap hardware that secures your TV and all your home electronic devices from sending sensitive data back to your internet service provider.

Email Risks and Solutions

  • How to lock down your current email in under five minutes – so you’re no longer at risk of getting hacked. (**NOTE: All a hacker needs is access to your email and he can wreak havoc on your life by accessing anything and everything tied to that email address – including your bank accounts!)
  • The two best open-source, encrypted email providers with enough features and functionality to be convenient.
  • The important limitations of ALL encrypted email… (if you don’t know this, your emails will not be secure.)
  • How to send password-protected emails to non-encrypted email addresses like Gmail.

Privacy Browsers

  • The best search engine to use so you can browse with confidence – without worrying about anyone seeing what you’re looking at online.

Privacy VPNs

  • How to set-up and use your own VPN.
  • The #1 most important step most people forget when setting up a VPN.

Privacy VPNs

  • How to eliminate the risk of a “sim-swap” attack and what you need to know about your phone carrier.
  • The one situation when you MUST ditch your old phone for a new one.
  • Three things you should never put on your phone. (**NOTE: If your phone is ever stolen, you are truly sunk if thieves can access these three things.)

Phone Apps and Privacy

  • The only secure way you should ever access sensitive apps like encrypted email and messaging.
  • The sneaky trick that gives you access to all your favorite sites without downloading potentially dangerous and privacy-destroying apps.(**NOTE: This is how you avoid giving away personal information to untrustworthy companies and app developers.)

Un-hackable Passwords

  • The brain-dead way most people create passwords that any sophisticated hacker can crack in three seconds flat! (Do NOT make this mistake!)
  • My #1 recommended open-source password manager that’s both highly encrypted AND convenient. (This is by far the single most important tool for making yourself impossible to hack.)
  • The step-by-step way to get unhackable passwords so you never have to worry about your online security again. (I show you exactly where to click and the whole set-up process can be done in less than 12 minutes.)
Glenn and Eric Meder

Privacy Academy started as an offshoot of the “Glenn Meder Newsletter,” where Glenn would write about privacy and how it relates to liberty. After years of spreading awareness, Glenn wanted to take it to the next level and provide actionable steps. That’s when the “Privacy Action Plan” was born.

Since then, his son Eric has joined him to spread this message.

Over the years, it has evolved into a full-on academy with many recorded courses, live trainings, and an active chat room of privacy- and freedom-loving people.

Glenn Meder

Glenn’s passion for privacy began when Edward Snowden revealed that the NSA was spying on US citizens. Since then, he has gone deep into studying online privacy and in-turn found that this is the biggest threat to liberty… potentially ever. Glenn designed Privacy Academy with the average, non-techy person in mind. To bridge the gap and preserve liberty.

Eric Meder

Eric Meder

Eric joined Glenn on his “privacy journey” over 5 years ago. Eric has a strong love for liberty and educating people on how modern technology is radically changing modern life. One of his biggest passions is educating parents and the youth about how they are being radicalized and manipulated through modern propaganda (think social media.)

Weekly Live Trainings

Don’t worry, all classes have replays so you can watch on your own schedule.

Each week we hold two live trainings: Fundamentals and Advanced. That way you can join live, follow along, and ask questions as we teach the lesson. It’s a great way to hold yourself accountable, and not get overwhelmed or stuck.

2

Pre-Recorded Courses

Go at your own pace and follow along with our 3 top-rated privacy courses – Privacy Action Plan Fundamentals, Privacy Action Plan Masterclass, and Private Online Shopping. Each course is packed with powerful videos and actionable steps.

3

Active Community with Privacy Experts

Join an active community of freedom and privacy loving people. If you get stuck along the way, ask your questions in the “Privacy Questions” chat so other community members or privacy experts can help.

Creating Burner Payment Cards

When you shop online, you are trusting that corporations are keeping your card info private. All it takes is one data breach for your cards to fall into bad hands. Learn how to easily create burner cards for each transaction.

How to Protect Yourself from Identity Theft

A reported 1 out of 3 Americans falls victim to identity theft each year. All of those victims share a common trait -they never thought it would happen to them. Learn how to prevent ever falling victim to identity theft.

How to Kill Spam Forever

The worst part about email is the spam and endless clutter. We will teach you 1. How to clean and organize your email, and make it actually enjoyable to use, and 2. Get tid of spam emails forever. (I know, that is a big promise, but yes, it really works!)

How to Set Up Your Bank Account Properly

Most people are completely unaware of what really happens at their banks. Learn how to interview your bank, what it means to be an unsecure creditor, and also set up your accounts for daily activity and ‘stop pay’ locks.

Private and Secure Crypto

At its inception, crypto was designed to be a tool for peer-to-peer transactions. Learn how to ensure 1. That your crypto is safe and secure and 2. How to use private cryptocurrencies like Monero to send and receive cash privately and digitally.

Create Your Own 
De-Googled Phone

Smartphones are the modern-day “Trojan Horse.” They are constantly with us, gathering an absurd amount of data and using that data to create profiles on us. Learning how to create your own private phone is essential.