Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of surveillance.
Group Chats: Talk to your friends or talk to the world. You decide. Closed Groups let you talk to up to 10 friends at once. Got a bigger crowd? Use a Open Group — connect with as many people as you want.
Voice Messages: Sometimes, a text just isn’t enough. Send something a little more personal — it’s okay, you’re still private. Session lets you send voice messages, so nothing gets lost in translation.
Attachments: Don’t leak those docs. Send all your files, images, and attachments through a network that takes your privacy seriously.
- No Phone Numbers – No identification is required to create a Session account.
- No Data Breaches – Session doesn’t collect data, so there’s nothing to leak.
- No Footprints – Send messages through our onion routing network and leave no trace.
- Open Source – Session’s code has nothing to hide. Anyone can view, audit and contribute.
- Sync Across Devices – One account, many devices. Session works wherever you go.
- Censorship Resistant – With no central point of failure, its harder to shut Session down.
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.
CryptPad Zero Knowledge Cloud
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means Read more.
Citizen’s Privacy Manual
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to you How to buy and establish Read more.
Code 2600 Documentary
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film Read more.
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use Read more.
The diaspora* Project
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store Read more.
Tutanota Secure Email
Tutanota is the world’s most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
The Battle to Control the Design of New Technologies Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance Read more.
DISAPPEAR – The Documentary
‘Disappear – cover your online tracks’ is an independent documentary film questioning digital self-defense and means to take back control of our online privacy. Not Read more.
The Mastodon Project
Social networking, back in your hands: Follow friends and discover new ones among more than 2.2M people. Publish anything you want: links, pictures, text, video. Read more.
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 5000+ servers in 60+ countries. Get secure Read more.
The Great Hack Documentary
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle Read more.
For the past five years, Michael Bazzell has been helping celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Read more.