Aurora App Store

  • On ·
  • By ·

Aurora Store is an alternate to Google’s Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps, get details about in-app trackers, spoof your location and much more.


Aurora App Store
Aurora Store is an alternate to Google’s Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps, Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Element Messenger
Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. What Read more.
Minds Cypto Social Network
Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is Read more.
Silent Pocket Leather Handbag
The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking Read more.
CTemplar Armored Email
Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.

The Self-Sufficient Life and How to Live It

  • On ·
  • By ·

The Complete Back-to-Basics Guide

If 2020 has taught us anything it is that we all need to be more self-sufficient!

For over 40 years, John Seymour has inspired thousands to make more responsible, enriching, and eco-friendly choices with his advice on living sustainably. The Self-Sufficienct Life and How to Live It offers step-by-step instructions on everything from chopping trees to harnessing solar power; from growing fruit and vegetables, and preserving and pickling your harvest, to baking bread, brewing beer, and making cheese.

In a world of mass production, intensive farming, and food miles, Seymour’s words offer an alternative: a celebration of the joy of investing time, labor, and love into the things we need.


The Self-Sufficient Life and How to Live It
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Easy Prey Podcast
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in Read more.
Go Linux: Parrot OS
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Active Measures
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking, Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.

The Social Dilemma Documentary

  • On ·
  • By ·

Discover what’s hiding on the other side of your screen

We tweet, we like, and we share— but what are the consequences of our growing dependence on social media? This documentary-drama hybrid reveals how social media is reprogramming civilization with tech experts sounding the alarm on their own creations. 

The Social Dilemma features the voices of technologists, researchers and activists working to align technology with the interests of humanity.


The Self-Sufficient Life and How to Live It
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Easy Prey Podcast
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in Read more.
Go Linux: Parrot OS
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Active Measures
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking, Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.

Element Messenger

  • On ·
  • By ·

Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe.

What makes Element unique?

Element is a new type of messaging app. You choose where your messages are stored, putting you in control of your data. It gives you access to the Matrix open network, so you can talk to anyone. Element provides a new level of security, adding cross-signed device verification to default end-to-end encryption.


Aurora App Store
Aurora Store is an alternate to Google’s Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps, Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Element Messenger
Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. What Read more.
Minds Cypto Social Network
Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is Read more.
Silent Pocket Leather Handbag
The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking Read more.
CTemplar Armored Email
Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.

Wallet Ninja Multitool

  • On ·
  • By ·

The Wallet Ninja is the world’s first 100% flat multi tool and fits in your wallet with credit cards. Made from 4x heat treated steel, The Wallet Ninja offers a lifetime guarantee to never rust, bend, or dull.

The power of 18 reliable, functional, everyday tools, in the size of a credit card! Tools that are included within the Wallet Ninja are: 6 Hex wrenches, a can opener, fruit peeler, bottle opener, ruler (standard & metric), letter opener, box opener, phone stand, eyeglasses, Phillips, and Flat head screwdriver!


Wallet Ninja Multitool
The Wallet Ninja is the world’s first 100% flat multi tool and fits in your wallet with credit cards. Made from 4x heat treated steel, Read more.
Vapur Microfilter Bottle
The Vapur MicroFilter is a lightweight, water filtration system that utilizes an advanced hollow fiber membrane technology. Together, the bottle and MicroFilter weigh just 2.7 Read more.
Grayman Plan-B Light Sling Pack
The Grayman Plan-B Light Go-Bag Sling Pack by Hazard is designed for the times you need to blend in and not show external ‘tactical’ features. Read more.
Angel Eyes E200u
The Latest RovyVon Flashlight: Angel Eyes E200u, compact size, weighs 2.89oz, dual CREE XP-G3 LED, max 1650 lumen with max beam distance of 111.5 yards. Read more.
LEATHERMAN Signal Multitool
The LEATHERMAN Signal is a perfect accessory for any adventure, combining 19 useful tools into a compact, 4.5-inch package. This multitool readies you for the Read more.
Rino Ready Companion
The Rino Ready Companion is built with the knowledge from first responders, survivalists, and designers to develop the world’s most advanced two person 72 hour Read more.
Casio G-SHOCK Move
The new GBH1000 G-SHOCK Move watch is equipped with heart rate monitor and GPS. Useful workout functions include an optical sensor for heart rate, along Read more.
Diversion Book Safe
The Jssmst book safe is locked by a 3-number combination lock, it is convenient to lock and open, and you don’t worry about losing keys. Read more.
Mace Pepper Gun with Strobe LED
Housed in a sleek delivery system, this pepper gun gives you effective, less-lethal protection against long-range threats. Its dual mode LED light distracts threats and Read more.
Sherpa 100 Power Bank
The Sherpa 100PD is made for action-packed days when every minute counts. It is Goal Zero’s best-selling power bank, slimmed down and dialed. With 94.72 Read more.
ITS Vehicle First Aid Kit
The ITS Vehicle First Aid Kit is the perfect solution to keep a medical kit close at hand when you’re on the go. This kit Read more.
IDENTILOCK Fingerprint Trigger Gun Lock
IDENTILOCK is the world’s fastest, most reliable trigger safety lock. Activated by fingerprint technology, it unlocks in 300 milliseconds! Configured with a master user profile, Read more.
No Touch Key by MILSPIN
Veteran Crafted in the USA. Use this ergonomic brass hand-extension to isolate your hands from high-touch surfaces. Open doors, flip switches, pull levers, push buttons, Read more.
BioLite Rechargeable HeadLamp
Experience top-tier performance with a fit unlike any headlamp you’ve experienced thanks to our proprietary 3D SlimFit Construction. With a front profile of only 9mm Read more.
Kuros! by Mace Brand Pepper Spray
KUROS Gives Protection to Women in Need The KUROS mission is to enhance the safety and mobility of women around the world. Taking a proactive Read more.
TG Plasma Lighter
Toss your flimsy gas station lighters in the garbage where they belong, and make way for the flameless innovation that is the TG Plasma Lighter. Read more.
Fullive Fireproof Document Bag
The Fullive Fireproof Document Bag is a safe bag for your possessions. It gives your important documents, cash, jewelry and other valuables a second layer Read more.
Maratac Pico Widgy Pry Bar
The Pico Widgy Pry Bar is made to fill the high demand for a customizable widgy bar which you can sharpen into your own EDC Read more.
Covobox Hidden Storage Book Box
Covobox— the original book box, and other Covogoods products are handmade. Vintage books are curated one book at a time, cut manually by machine, and Read more.
Commander Tactical Pen
The RovyVon Commander C20 is made of titanium and precision CNC machined, the body utilizes pure titanium for a comfortable hold and touch, the cap Read more.
Tuffy Security Products
Designed and Engineered in the USA Since 1989, Tuffy Security Products has been a leading provider of secure vehicle storage products for outdoor enthusiasts. Tuffy Read more.
SOG Baton Q4 Multitool
Trust the SOG Baton Q4 to come in handy at home, at work and on the road. SOG, based in Seattle, WA, created this multitool Read more.
ITS Escape Laces
The ITS Escape Laces™ come in 54”, 60” and 72” sizes, enabling you to utilize them as a friction saw to melt right through plastic Read more.
ECOFLOW River Portable Power Station
RIVER 370 is the second generation of the flagship ECOFLOW RIVER portable power station. RIVER 370 is industrial yet lightweight, portable and easy to use. Read more.
Gerber GDC Money Clip
Thanks to technology via phone apps that have replaced an array of credit and loyalty cards, fewer items wind up in wallets. This translates to Read more.
ITS 4-in-1 Emergency Tool
This 4-in-1 Emergency Tool is the perfect addition to any disaster readiness kit and provides the ability to shut off gas and water valves, as Read more.
Ti EDC Adjustable Wrench
An entire wrench set in the palm of your hand. Typically, an adjustable wrench isn’t the most portable thing in the world…until now. At just Read more.
Desperado Guitar Gun Case
The Desperado Guitar Gun Case by Cedar Mill Fine Firearms is an elegant approach to the covert, discreet concealment rifle case. Pick and Pluck Cubed Read more.
Geekey Multi-Tool
Geekey is an innovative, compact multi-tool that is truly a work of art with engineering that combines everyday common tools into one sleek little punch Read more.
The Freedom Bulletproof Vest
The Freedom Men’s Bulletproof Vest is rated to cover .22LR to .45 ACP out of up to 4″ barrels. These are common calibers and the Read more.

Minds Cypto Social Network

  • On ·
  • By ·

Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is to build a new model for content creators to take back their Internet freedom, revenue and social reach.

How does it work?

Post videos, blogs, images and statuses. Message and video chat securely with groups or directly with friends. Discover great content through trending feeds and hashtags. Earn tokens for your daily contributions and use them to upgrade


Aurora App Store
Aurora Store is an alternate to Google’s Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps, Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Element Messenger
Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. What Read more.
Minds Cypto Social Network
Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is Read more.
Silent Pocket Leather Handbag
The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking Read more.
CTemplar Armored Email
Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.

Creating a Cyber Secure Home

  • On ·
  • By ·

Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and online accounts. It also covers the importance of information backups, such as Cloud services or external hard drives, in the event of an attack, theft, or loss of a device. Secure behaviors at work often start at home.


Creating a Cyber Secure Home
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and Read more.
Fingbox Home Network Monitoring
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network. Read more.
Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.

Silent Pocket Leather Handbag

  • On ·
  • By ·

The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking RFID signals from unauthorized scans.

This simple zip up Carryall Clutch is the perfect travel companion to keep your belongings portable and secure. It has an internal compartment to shield RFID & NFC and comes equipped with 6 card slots and plenty of room for currency, keys, and small documents. Keep your passport, credit cards, and chipped items secure!

These stylish and lightweight clutch handbags use smooth and supple leather that will withstand years of daily use. Perfect gift for women, for any occasion.


Aurora App Store
Aurora Store is an alternate to Google’s Play Store, with an elegant design, using Aurora you can download apps, update existing apps, search for apps, Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Element Messenger
Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. What Read more.
Minds Cypto Social Network
Minds is an open source and decentralized social networking platform where users are rewarded with Minds tokens for contributions to the community. Their goal is Read more.
Silent Pocket Leather Handbag
The Silent Pocket Leather Handbag clutch handbags protect you from identity theft and credit card data breaches with the most advanced RFID Secure Technology, blocking Read more.
CTemplar Armored Email
Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.

Easy Prey Podcast

  • On ·
  • By ·

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. The goal is to educate and equip you, so you learn how to spot the warnings signs of trouble, take quick action, and lower the risk of becoming a victim.


The Self-Sufficient Life and How to Live It
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Easy Prey Podcast
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in Read more.
Go Linux: Parrot OS
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Active Measures
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking, Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.

Go Linux: Parrot OS

  • On ·
  • By ·

Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure.

*** Image sourced from DistroWatch.com


The Self-Sufficient Life and How to Live It
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John Read more.
The Social Dilemma Documentary
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing Read more.
Easy Prey Podcast
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in Read more.
Go Linux: Parrot OS
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes Read more.
Exodus Privacy
εxodus – the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a Read more.
Active Measures
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking, Read more.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.