AntennaPod

  • On ·
  • By ·

The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

National Cybersecurity Awareness Month

  • On ·
  • By ·

October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.

During National Cybersecurity Awareness Month (NCSAM), the following tip sheets and resources are invaluable tools for reducing cybersecurity risks and protecting yourself online. Use these resources in your communities and share them with your stakeholders throughout the year to encourage strong, nationwide cybersecurity. These materials are free and may be modified to meet your needs.

Topics include:

  • Cybersecurity at Work
  • Cybersecurity While Traveling
  • Identity Theft and Internet Scams
  • E-Skimming
  • Internet of Things
  • Multi-factor Authentication
  • Online Privacy
  • Passwords
  • Phishing
  • Protecting Your Digital Home
  • Social Media Cybersecurity


Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.
Mojave Faraday Travel Case
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone Read more.
Trezor One Cryptocurrency Wallet
TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while Read more.

The Creepy Line Documentary

  • On ·
  • By ·

“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Eric Schmidt

An eye-opening documentary, The Creepy Line reveals the stunning degree to which society is manipulated by Google and Facebook and blows the lid off the remarkably subtle – hence powerful – manner in which they do it.

The Creepy Line takes the conversation about data privacy and control further than ever before by examining what Google and Facebook do once they control a user’s data. Not only is this data sold to the highest bidder, but it is used to mold, massage, and manipulate the public consciousness while influencing opinion on a vast scale – all with the goal of transforming society to fit their worldview.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

Blue Yonder Travel Hoodie

  • On ·
  • By ·

The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count on the Blue Yonder Hoodie to take the turbulence out of travel.

Looks far more professional, thanks to a subtle honeycomb texture and heathered color that’s classy enough for a client meeting. Better yet, it’ll keep all your travel essentials at hand with 4 pockets outside and 7 inside – even includes an RFID wallet to prevent high-tech thieves from scanning your credit card and passport data.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Blokada Mobile Ad Blocker

  • On ·
  • By ·

Ad blocker for Android and iOS: free and open source.

If you want to efficiently block ads, trackers, malware, save on your data plan, speed up your device and protect your privacy with just one application, then Blokada is for you. It is free, secure and open source.

Blokada works across all of your apps, not just your browser! It doesn’t require root or jailbreak, supports both Wi-Fi and mobile networks, and is perfectly safe and simple to use. Just turn it on, and it will do the job silently!


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Disroot

  • On ·
  • By ·

Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining!

Services include:

  • Email
  • Cloud
  • Discussion Forum
  • Instant Messaging
  • Text Editor
  • Spreadsheet
  • much more…


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Extreme Privacy

  • On ·
  • By ·

Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.


VetSec: A Veteran Cyber Security Community
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the Read more.
Go Linux: Qubes OS
Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing. Secure Compartmentalization: Qubes brings to your personal computer the security Read more.
The Fifth Domain
Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats An urgent warning from two bestselling security experts–and a gripping inside look Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
RESET Podcast
Every story is a tech story. We live in a world where algorithms drive our interests, scientists are re-engineering our food supply, and a robot Read more.
Go Linux: Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. The developers aim to deliver the best “out of the box” user experience by providing the latest Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
Cyber Crime Documentary
Cyber Crime is a documentary film about a growing plague in our expanding digital world. Billions of dollars a year are stolen or lost as Read more.
Malicious Life Podcast
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
Go Linux: PinguyOS
PinguyOS offers unparalleled beauty. With many customizations and fantastic themes installed by default, it will make others say “wow, what’s that?” The ethos of PinguyOS Read more.
Do You Trust This Computer? Documentary
Science fiction has long anticipated the rise of machine intelligence. Today, a new generation of self-learning computers has begun to reshape every aspect of our Read more.
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month they release a new and exciting episode, each with its own specific topic of Read more.
Go Linux: Ubuntu MATE
Ubuntu MATE is a stable, easy-to-use operating system with a configurable desktop environment. It is ideal for those who want the most out of their Read more.
Stealth War
How China Took Over While America’s Elite Slept China expert Robert Spalding reveals the shocking success China has had infiltrating American institutions and compromising our Read more.
Go Incognito by Techlore
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the Read more.
Fieldcraft Survival Podcast
The FieldCraft Survival Podcast is an informative series in survival, tactics, defense, politics, guns, fitness, overlanding, military, and gear. All things preparedness and survival from Read more.
Go Linux: PinguyOS
PinguyOS is a Linux distribution that is built on the Ubuntu framework. The ethos of PinguyOS is very simple, to look good, work well and Read more.
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
Cyber Podcast
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you Read more.
Go Linux: Netrunner
Netrunner is a complete Linux Operating System for PCs, laptops/netbooks and ARM microcomputers, that makes exclusive use of the KDE Plasma desktop environment. Netrunner is Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Go Linux: Emmabuntüs
Emmabuntüs is a desktop computer type of distribution, easily accessible and ready to use. It is accessible for beginners and, since it uses relatively few Read more.
Home Defense
The Ultimate Prepper’s Guide to Turn Your Home into a Disaster-Proof Fortress. Not every disaster can be fixed. Whether it’s an epidemic or a super Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Hacking Humans Podcast
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
Go Linux: Linux Lite
Linux Lite is a ‘gateway operating system’. It was created to make the transition from Windows to a linux based operating system, as smooth as Read more.
Re-Engineering Humanity
In this wide-reaching, interdisciplinary book, Brett Frischmann and Evan Selinger examine what’s happening to our lives as society embraces big data, predictive analytics, and smart Read more.

GrapheneOS

  • On ·
  • By ·

GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and security technology including substantial improvements to sandboxing, exploit mitigations and the permission model.

GrapheneOS improves the privacy and security of the OS from the bottom up. GrapheneOS tries to avoid impacting the user experience with the privacy and security features. These changes are designed to eliminate whole classes of serious vulnerabilities or provide meaningful barriers to exploitation.

GrapheneOS will never include either Google Play Services or another implementation of Google services like microG. Apps designed to run on Android rather than only Android with bundled Google apps and services already work on GrapheneOS, so a huge number of both open and closed source apps are already available for it.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Telegram Messenger

  • On ·
  • By ·

Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed.

Connect from the most remote locations. Coordinate groups of up to 200,000 members. Synchronize your chats across all your devices. Send documents of any type. Encrypt personal and business secrets. Destruct your messages with a timer. Store your media in the cloud. Build your own tools on our API. Enjoy feedback from your customers.

Why use Telegram?

  • Private: messages are heavily encrypted and can self-destruct.
  • Cloud-Based: lets you access your messages from multiple devices.
  • Fast: delivers messages faster than any other application.
  • Distributed: servers are spread worldwide for security and speed.
  • Open: has an open API and protocol free for everyone.
  • Free: is free forever. No ads. No subscription fees.
  • Secure: keeps your messages safe from hacker attacks.
  • Powerful: has no limits on the size of your media and chats.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Lokinet: Private Internet Browsing

  • On ·
  • By ·

Privately Access Censorship Resistant Websites

Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, called Lokinet. Onion routing protocols allow for users to form tunnels or paths through a distributed network, using multiple nodes as hops to obfuscate the destination and origin of data packets.

The network does not rely on trusted authorities and its state is fully derived from the blockchain. Users can connect to individual Service Nodes and create bidirectional paths for packets to be routed through. The network can be used to access internally hosted services called SNApps. Users can utilise Service Nodes exit functionality to browse the external internet without their IP address being exposed.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.