Oxen Private Cryptocurrency

  • On ·
  • By ·

Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.

Their vision is to provide a range of tools and services powered by the $OXEN cryptocurrency, enabling users and developers all over the world to leverage the power of decentralized blockchain networks to achieve unparalleled privacy and security as they work, play, and live their day-to-day lives on the internet.


The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you
Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
Orbot is a Tor proxy app for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software
Orfox is a Tor Browser for Android brought to you by the Guardian Project. Guardian Project creates easy to use secure apps, open-source software libraries,
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options
Tutanota is the world's most secure email service, easy to use and private by design. With end-to-end encryption and 2FA, your emails have never been
ProtonVPN is a security focused VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection. Unique Features
Linphone is an open source SIP phone for smartphones, tablets and desktop platforms. Linphone provides voice/video calls and instant messaging, and is available for mobile
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
Silent Pocket's flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device
DuckDuckGo does not store your personal information. Ever. Their privacy policy is simple: they do not collect or share any of your personal information. DuckDuckGo
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
Firefox Focus brings added privacy by allowing you to block known website trackers by category: Ads, analytics and social trackersOther content trackers – this category
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Forget about credit card fraud, data breaches, or having to update billing information at all the services you use when a card gets hacked. Foil
The only modern smartphone you can (truly) own. Smartphones have become the single most significant piece of technology in our lives, a gateway to the
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted before being sent, which means
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 5000+ servers in 60+ countries. Get secure
Secure messenger for friends, families and small communities. Wire Personal is a secure, privacy-friendly messenger for personal use. It combines useful and fun features, audited

Keywallet Touch Cryptocurrency Wallet

  • On ·
  • By ·

KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to hack assets in the cold wallet. KeyWallet Touch has the convenience of mobile wallet and the safety of cold wallet.

KeyWallet Touch is the best hybrid blockchain wallet. You can use mobile wallet and cold wallet simultaneously. KeyWallet Touch is available for Android, iOS and Windows. You can also use KeyWallet Touch on PC using a dedicated KeyWallet Reader.


The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure

Nano S Cryptocurrency Hardware Wallet

  • On ·
  • By ·

Protect your crypto assets with the most popular hardware wallet in the market.

The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple and Altcoins, allowing you to manage multiple assets with the same hardware wallet.

Your private key giving access to your coins is never exposed. It is protected within a secure chip locked by a PIN code, the same chip as the one used for passports and credit cards.

The device is controlled by only 2 buttons, and all actions can be verified on its screen. And the Ledger companion apps enable you to easily manage your crypto transactions.

Your crypto assets stay secure even if you lose your Ledger Nano S: your 24 key words are backed up on a recovery sheet, and your account(s) can easily be restored on any Ledger device.


The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure

Trezor One Cryptocurrency Wallet

  • On ·
  • By ·

TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while maintaining an absolute ease-of-use, whether you are a security expert or a brand new user.

A next step in the evolution of bitcoin towards a completely safe storage and payment system. Trezor brings peace of mind.

Ultimate security: No matter how unprotected your computer or internet connection might be, your coins stay always safe with Trezor as it never exposes your private keys. Trezor is an isolated environment for offline transaction signing, using a small display for you to visually verify the transaction contents. That’s why all operations using Trezor are entirely safe

Easy to use: Trezor is Windows, OS X, and Linux friendly. All you need to do is to connect your Trezor to a computer and follow the instructions. There are only two hardware buttons, to confirm or to deny the action, so using Trezor is as easy, safe and as intuitive as it can be. Users can backup the whole Trezor contents on a small piece of paper and use this backup to regain access to all their coins in case of disaster, loss or theft.

Modern cryptography: Trezor uses state of the art cryptographic algorithms and practices, but you don’t have to read long manuals or to be a crypto-expert in order to use them properly.

Community-driven open-source: Trezor code is open-source and technical decisions are discussed with the wider developer community. Everything can be audited by an independent third party. This ensures that Trezor is absolutely transparent and backdoor-free

Highest Security: Protect your bitcoin with the highest level of security available, the Trezor. Never worry about computer viruses, malware, keyloggers or hackers again; your private keys never leave the device.


The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB Data Blocker grants devices immunity
The OffGrid Kit includes one mobile, tablet, and laptop OffGrid bag. EDEC’s OffGrid line includes sleek designs with stitchless, thermo-welded seams and a new magnetic,
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
One of the most secure USB 3.0 flash drives available, Lexar JumpDrive F35 uses an ultra-fast fingerprint authentication that allows you to protect your data
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are
The YubiKey 5 NFC is the world's most protective security key that works with more online services and applications than any other security key. Usernames
Encrypted - The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Based on TrueCrypt 7.1a. Encryption is automatic, real-time(on-the-fly) and transparent.
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure