EDEC OffGrid Kit

  • On ·
  • By ·

The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic, single-fold velcro closure mechanism. Each bag is lined with four layers of Faraday material to shield devices. The innermost layer is constructed of a diamond ripstop Faraday fabric to prevent abrasion from devices.

All bags feature a single-fold velcro seal that is backed by a magnetic closure. The magnetic closure creates a continuous closed loop to eliminate any gaps that can be infiltrated by signals. The minimalistic form of these bags makes them discreet and easily transportable for day to day use.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil
The only modern smartphone you can (truly) own. Smartphones have become the single most significant piece of technology in our lives, a gateway to the
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 5000+ servers in 60+ countries. Get secure
Secure messenger for friends, families and small communities. Wire Personal is a secure, privacy-friendly messenger for personal use. It combines useful and fun features, audited
The Mission Darkness FreeRoam Faraday Belt Bag is a stylish waist pack perfect for travel and everyday wear. The large interior compartment is lined with

Thetis FIDO U2F Security key

  • On ·
  • By ·

Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB port.

The Thetis U2F key can be used on any websites which support U2F protocol with the latest Chrome installed on your Windows, Mac OS or Linux. Never lose your accounts through password theft, phishing, hacking or keylogging scams.

It can be used on Windows 7, Windows 8, Windows 8.1, Windows 10, Mac OS X, and Linux with latest Chrome browser or Opera browser installed.

Designed with a 360° rotating metal cover that shields the USB connector when not in use. Also, crafted from a durable aluminum alloy to protect the Key from drops, bumps and scratches.


The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

Mojave Faraday Travel Case

  • On ·
  • By ·

Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone during airport travel, commuting, and busy locations.

Mojave Travel Case shields cell phones or electronic devices in faraday sleeve compartment while keeping frequently used accessories organized in separate unshielded compartments. The faraday sleeve shields electronic devices from ALL wireless signals so they cannot be hacked, tracked, or digitally altered.

The frarady compartment provides 100% shielding from:

  • WiFi (2.4 & 5GHz)
  • Bluetooth
  • cellular signals (4G LTE+)
  • GPS
  • RFID
  • RF signals with 60-80dB average attenuation.

The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

Sandworm

  • On ·
  • By ·

A New Era of Cyberwar and the Hunt for
the Kremlin’s Most Dangerous Hackers

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businesses—from drug manufacturers to software developers to shipping companies. At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,
ProPrivacy.com researchs and investigates tools and companies that can help you keep your privacy online. We also uncover data breaches, hold people to account, investigate
Your Ideal Home in the Middle of Nowhere After spending three years on the road living in a camper van, Foster Huntington continued his unconventional
How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World In this provocative book about our new tech-based reality, political insider and tech
Based on the best-selling book by New York Times national security correspondent David E. Sanger, The Perfect Weapon explores the rise of cyber conflict as
Daniel Miessler spends 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as
The Complete Back-to-Basics Guide If 2020 has taught us anything it is that we all need to be more self-sufficient! For over 40 years, John
Discover what’s hiding on the other side of your screen We tweet, we like, and we share— but what are the consequences of our growing
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
The Secret History of Disinformation and Political Warfare We live in the age of disinformation―of organized deception. Spy agencies pour vast resources into hacking, leaking,
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
Founded in February of 2018, VetSec is a non profit consisting of an ever-growing veteran community that focuses on networking with other veterans in the

Lexar Fingerprint Flash Drive

  • On ·
  • By ·

One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data against unauthorized users – in under one second.

The F35 can save up to 10 fingerprint IDs, making sure only you and your closest collaborators have access to your files. It also boasts an easy set-up with no software driver required, so you can quickly start transferring your files with speeds up to 150MB/s.

  • Up to 10 fingerprint IDs allowed
  • Ultra-fast recognition – less than 1 second
  • Easy set-up, no software driver needed
  • Securely protects files using 256-bit AES encryption

The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

Bitwarden Password Manager

  • On ·
  • By ·

Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are stolen. When you reuse the same passwords everywhere hackers can easily access your email, bank, and other important accounts.

Security experts recommend that you use a different, randomly generated password for every online account that you create. But how are you supposed to remember and keep up with that many passwords?

Bitwarden helps you create and manage secure passwords so that you can get back to enjoying your life online.


The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

YubiKey 5 NFC

  • On ·
  • By ·

The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key.

Usernames and passwords are not enough to protect your accounts. Using a security key as a form of two-factor authentication is a simple and proven method for locking down your accounts and keeping them secure. A YubiKey makes it extremely difficult to gain access or steal your most important files, pictures, emails, and financial information.

Secure your login and protect your account with hundreds of services like Gmail, Facebook, Dropbox, Twitter, Dashlane, Skype, Outlook, LastPass and more. This YubiKey delivers strong authentication over Near Field Communications (NFC) and via USB-A ports. The YubiKey is simple to register with hundreds of services. Once registered, each service will simply request you to insert and tap your YubiKey to gain access during login.

YubiKeys are tamper proof, water resistant, and crush resistant. Simple, convenient, and secure.


The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

KeePassXC Password Manager

  • On ·
  • By ·

Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that is compatible with KeePass Password Safe. Your wallet works offline and requires no Internet connection.

Cross-Platform – KeePassXC is a community fork of KeePassX, the cross-platform port of KeePass for Windows. Every feature works cross-platform and was thoroughly tested on multiple systems to provide users with the same look and feel on every supported operating system. This includes the beloved Auto-Type feature.

Open Source – The full source code is published under the terms of the GNU General Public License. KeePassXC views open source as a vital prerequisite for any security-critical software product. For that reason, KeePassXC is and always will be free. Contributions by everyone are welcome!

Main Features:

  • Secure storage of passwords and other private data with AES, Twofish or ChaCha20 encryption
  • Cross-platform, runs on Linux, Windows and macOS without modifications
  • File format compatibility with KeePass2, KeePassX, MacPass, KeeWeb and many others (KDBX 3.1 and 4.0)
  • SSH Agent integration
  • Auto-Type on all supported platforms for automagically filling in login forms
  • Key file and YubiKey challenge-response support for additional security
  • TOTP generation (including Steam Guard)
  • CSV import from other password managers (e.g., LastPass)
  • Command line interface
  • Stand-alone password and passphrase generator
  • Password strength meter
  • Custom icons for database entries and download of website favicons
  • Database merge functionality
  • Automatic reload when the database was changed externally
  • Browser integration with KeePassXC-Browser for Google Chrome, Chromium, Vivaldi, and Mozilla Firefox.

The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

VeraCrypt

  • On ·
  • By ·

VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent. Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.

Encryption can be hardware-accelerated on modern processors. Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume and hidden operating system.

VeraCrypt features:

  • Creates a virtual encrypted disk within a file and mounts it as a real disk.
  • Encrypts an entire partition or storage device such as USB flash drive or hard drive.
  • Encrypts a partition or drive where Windows is installed (pre-boot authentication).

The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

Silent Pocket Faraday Laptop Sleeve

  • On ·
  • By ·

The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable waterproof woven nylon or real cow leather with our patented Faraday cage embedded inside. It’s a stylish, convenient accessory that gives you daily peace of mind. Instantly block ALL Wireless Signal, Cellular, GPS, WiFi, Bluetooth, RFID and NFC.


The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil
The only modern smartphone you can (truly) own. Smartphones have become the single most significant piece of technology in our lives, a gateway to the
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 5000+ servers in 60+ countries. Get secure
Secure messenger for friends, families and small communities. Wire Personal is a secure, privacy-friendly messenger for personal use. It combines useful and fun features, audited
The Mission Darkness FreeRoam Faraday Belt Bag is a stylish waist pack perfect for travel and everyday wear. The large interior compartment is lined with