Choose encryption. Choose software with embedded TLS support. Choose elliptic curve cryptography. Choose cipher which developed by non-government researchers. Choose strong passwords which should be saved in the encrypted place. Choose DNSSEC for your domain. Choose GnuPG key for your private mail. Choose SSH tunnel to the remote server for hiding traffic from your internet provider. Choose Tor exit node in country with loyal laws. Choose really long key for really sensitive data. Choose your future. Choose encryption.