As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t.
But you don’t notice anything, because all of this happens invisibly under the hood.
Little Snitch makes these Internet connections visible and puts you back in control of your Mac!
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
CryptPad Zero Knowledge Cloud
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means Read more.
Citizen’s Privacy Manual
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to you How to buy and establish Read more.
Code 2600 Documentary
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film Read more.
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use Read more.
The diaspora* Project
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store Read more.
Tutanota Secure Email
Tutanota is the world’s most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
The Battle to Control the Design of New Technologies Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance Read more.
DISAPPEAR – The Documentary
‘Disappear – cover your online tracks’ is an independent documentary film questioning digital self-defense and means to take back control of our online privacy. Not Read more.
The Mastodon Project
Social networking, back in your hands: Follow friends and discover new ones among more than 2.2M people. Publish anything you want: links, pictures, text, video. Read more.