NOTHING TO HIDE Documentary

  • On ·
  • By ·

NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument. The documentary was produced and directed by a pair of Berlin-based journalists, Mihaela Gladovic and Marc Meillassoux. It was crowdfunded by over 400 backers.

NOTHING TO HIDE questions the growing, puzzling and passive public acceptance of massive corporate and governmental incursions into individual and group privacy and rights.

People generally agree that mass surveillance regimes are inherently invasive and authoritarian. Yet at the same time, the number of online apps and “free” services people install is constantly increasing. Forced to accept their terms and conditions, they click away their privacy and grant access to their own personal data. To justify their compliance, most of the people usually repeat: “Anyway, I don’t interest anyone”, “Why would they look at me?” and finally “I have NOTHING TO HIDE”.

The ‘Mister X Experiment’

Through the stories of five protagonists, the documentary questions the threats that mass surveillance can pose to our democracies and for people who might think they are not concerned. The main character of the movie is a young artist in Berlin, who tend to think that he has “nothing to hide”.

Mister X accepted to be tracked over 30 days on his cell phone and laptop. His data were then given to a data analyst and a tracker specialist. The experiment needed a month of preparation, a month of shooting and a month of analysis. The challenge was to see how much the two hackers could learn about Mister X through his digital activity (WhatsApp, Facebook, GPS location…) focusing only on his metadata (without looking into the contents of his communications).


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your

PrivacyTools.io

  • On ·
  • By ·

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your

The Watchman Guide to Privacy

  • On ·
  • By ·

Reclaim Your Digital, Financial, and Lifestyle Freedom

Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from digital privacy and asset protection to international nomadism and privacy during the COVID lockdowns. Equally important, it presents hundreds of real examples, arguments, and historical contexts for why privacy is the most important thing one can preserve.


εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining!
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a

Darknet Diaries Podcast

  • On ·
  • By ·

Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.

The show is produced by Jack Rhysider, a veteran to the security world. He gained his professional knowledge of security by working in a Security Operations Center, a place to where threats are detected and stopped.


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your

The Encyclopedia of Country Living

  • On ·
  • By ·

The Original Manual for Living off the Land & Doing It Yourself

The definitive book of basic skills and country wisdom for living off the land, being prepared, and doing it yourself–whether it’s on a farm or homestead, in the suburbs or city.

From homesteaders to urban farmers, and everyone in between, there is a desire for a simpler way of life—a healthier, greener, more self-sustaining, and holistic approach to modern life.


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your

The Great Hack Documentary

  • On ·
  • By ·

Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle for control of our most intimate personal details. From award-winning filmmakers Karim Amer and Jehane Noujaim, THE GREAT HACK uncovers the dark world of data exploitation with astounding access to the personal journeys of key players on different sides of the explosive Cambridge Analytica/Facebook data scandal.

Academy-Award nominees Amer and Noujaim (The Square, Control Room, Startup.com) continue their tradition of exploring the seismic ripples of social media with this riveting, complex film. THE GREAT HACK forces us to question the origin of the information we consume daily. What do we give up when we tap that phone or keyboard and share ourselves in the digital age?


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your

Dawn of the Code War

  • On ·
  • By ·

America’s Battle Against Russia, China,
and the Rising Global Cyber Threat

With each passing year, the internet-linked attacks on America’s interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The “Code War” is upon us.

In this dramatic book, former Assistant Attorney General John P. Carlin takes readers to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as our entire economy goes digital, from banking to manufacturing to transportation, the potential targets for our enemies multiply. This firsthand account is both a remarkable untold story and a warning of dangers yet to come.


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your

The Privacy, Security, & OSINT Podcast

  • On ·
  • By ·

Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible, stay secure from cyber threats, and make you a better online investigator. If you are new, please consider episodes 174-178.


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your

ProPrivacy.com

  • On ·
  • By ·

ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate the privacy industry (VPNs, ad blockers), so you know who to trust. Learn how to protect your digital privacy and stay safe online with ProPrivacy.


εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining!
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a

Off Grid Life

  • On ·
  • By ·

Your Ideal Home in the Middle of Nowhere

After spending three years on the road living in a camper van, Foster Huntington continued his unconventional lifestyle by building a two-story treehouse. Foster, like many others, are finding freedom, tranquility, and adventure in living off the grid in unconventional homes.


Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
Linux Lite is a 'gateway operating system'. It was created to make the transition from Windows to a linux based operating system, as smooth as
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what's happening to our lives as society embraces big data, predictive analytics, and smart
The threats to our digital world are real and they are happening every day all around the globe. Unchecked, digital will spiral into a dark
PCLinuxOS is a free easy to use Linux-based Operating System for desktops or laptops. Everything you do with that other OS you can do with
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
The CyberWire Podcast distills the day’s critical cyber security news into a concise daily podcast. Building upon their popular Daily Briefing, The CyberWire podcast includes
The open source Ubuntu desktop operating system powers millions of PCs and laptops around the world. Ubuntu comes with everything you need to run your