The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count on the Blue Yonder Hoodie to take the turbulence out of travel.
Looks far more professional, thanks to a subtle honeycomb texture and heathered color that’s classy enough for a client meeting. Better yet, it’ll keep all your travel essentials at hand with 4 pockets outside and 7 inside – even includes an RFID wallet to prevent high-tech thieves from scanning your credit card and passport data.
Kill Chain Documentary
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses Read more.
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.