The gold standard in privacy.
Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper image. Privacy has never looked better. The unique glossy gold finish lets you see a clean, crisp image while prying eyes from the side only see a vibrant gold shield.
- Effective privacy outside the 60 degree center viewing angle
- Great for high-resolution displays
- Gold, glossy finish for incredible clarity
- Reversible to a glossy black
- Reduces 35% of blue light transmission from the display
- Helps protect from everyday dust and scratches
- Multiple attachment options
- Easy to attach, remove and clean
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
CryptPad Zero Knowledge Cloud
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means Read more.
Citizen’s Privacy Manual
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to you How to buy and establish Read more.
Code 2600 Documentary
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film Read more.
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use Read more.
The diaspora* Project
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store Read more.
Tutanota Secure Email
Tutanota is the world’s most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
The Battle to Control the Design of New Technologies Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance Read more.