The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.
During National Cybersecurity Awareness Month (NCSAM), the following tip sheets and resources are invaluable tools for reducing cybersecurity risks and protecting yourself online. Use these resources in your communities and share them with your stakeholders throughout the year to encourage strong, nationwide cybersecurity. These materials are free and may be modified to meet your needs.
- Cybersecurity at Work
- Cybersecurity While Traveling
- Identity Theft and Internet Scams
- Internet of Things
- Multi-factor Authentication
- Online Privacy
- Protecting Your Digital Home
- Social Media Cybersecurity
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Eric Schmidt
An eye-opening documentary, The Creepy Line reveals the stunning degree to which society is manipulated by Google and Facebook and blows the lid off the remarkably subtle – hence powerful – manner in which they do it.
The Creepy Line takes the conversation about data privacy and control further than ever before by examining what Google and Facebook do once they control a user’s data. Not only is this data sold to the highest bidder, but it is used to mold, massage, and manipulate the public consciousness while influencing opinion on a vast scale – all with the goal of transforming society to fit their worldview.
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count on the Blue Yonder Hoodie to take the turbulence out of travel.
Looks far more professional, thanks to a subtle honeycomb texture and heathered color that’s classy enough for a client meeting. Better yet, it’ll keep all your travel essentials at hand with 4 pockets outside and 7 inside – even includes an RFID wallet to prevent high-tech thieves from scanning your credit card and passport data.
Ad blocker for Android and iOS: free and open source.
If you want to efficiently block ads, trackers, malware, save on your data plan, speed up your device and protect your privacy with just one application, then Blokada is for you. It is free, secure and open source.
Blokada works across all of your apps, not just your browser! It doesn’t require root or jailbreak, supports both Wi-Fi and mobile networks, and is perfectly safe and simple to use. Just turn it on, and it will do the job silently!
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining!
- Discussion Forum
- Instant Messaging
- Text Editor
- much more…
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and security technology including substantial improvements to sandboxing, exploit mitigations and the permission model.
GrapheneOS improves the privacy and security of the OS from the bottom up. GrapheneOS tries to avoid impacting the user experience with the privacy and security features. These changes are designed to eliminate whole classes of serious vulnerabilities or provide meaningful barriers to exploitation.
GrapheneOS will never include either Google Play Services or another implementation of Google services like microG. Apps designed to run on Android rather than only Android with bundled Google apps and services already work on GrapheneOS, so a huge number of both open and closed source apps are already available for it.
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed.
Connect from the most remote locations. Coordinate groups of up to 200,000 members. Synchronize your chats across all your devices. Send documents of any type. Encrypt personal and business secrets. Destruct your messages with a timer. Store your media in the cloud. Build your own tools on our API. Enjoy feedback from your customers.
Why use Telegram?
- Private: messages are heavily encrypted and can self-destruct.
- Cloud-Based: lets you access your messages from multiple devices.
- Fast: delivers messages faster than any other application.
- Distributed: servers are spread worldwide for security and speed.
- Open: has an open API and protocol free for everyone.
- Free: is free forever. No ads. No subscription fees.
- Secure: keeps your messages safe from hacker attacks.
- Powerful: has no limits on the size of your media and chats.
Privately Access Censorship Resistant Websites
Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, called Lokinet. Onion routing protocols allow for users to form tunnels or paths through a distributed network, using multiple nodes as hops to obfuscate the destination and origin of data packets.
The network does not rely on trusted authorities and its state is fully derived from the blockchain. Users can connect to individual Service Nodes and create bidirectional paths for packets to be routed through. The network can be used to access internally hosted services called SNApps. Users can utilise Service Nodes exit functionality to browse the external internet without their IP address being exposed.