Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil fraudsters, keep you personal information safe and take back control of your online spending!
- Complete Control: Set max charge limits on each card and close any card with just a swipe.
- Private Payments: Spend anonymously. Use a fake name when you pay. It’s nobody’s business what you buy.
- Foil Fraudsters: Cards are automatically locked to the first merchant they’re used at. So you’re safe even if the merchant gets breached.
- Stop Subscriptions: Set a max charge or make your card single use, so you’ll never forget to cancel one of those pesky “30 day free trials.”
- Completely free: Privacy.com makes money from merchants, just like a debit or credit card. They will not sell your information or surprise you with any hidden fees.
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
CryptPad Zero Knowledge Cloud
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means Read more.
Citizen’s Privacy Manual
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to you How to buy and establish Read more.
Code 2600 Documentary
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film Read more.
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use Read more.
The diaspora* Project
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store Read more.
Tutanota Secure Email
Tutanota is the world’s most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
The Battle to Control the Design of New Technologies Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance Read more.
DISAPPEAR – The Documentary
‘Disappear – cover your online tracks’ is an independent documentary film questioning digital self-defense and means to take back control of our online privacy. Not Read more.
The Mastodon Project
Social networking, back in your hands: Follow friends and discover new ones among more than 2.2M people. Publish anything you want: links, pictures, text, video. Read more.
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 5000+ servers in 60+ countries. Get secure Read more.
The Great Hack Documentary
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle Read more.