Session Messenger

  • On ·
  • By ·

Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of surveillance.

Group Chats: Talk to your friends or talk to the world. You decide. Closed Groups let you talk to up to 10 friends at once. Got a bigger crowd? Use a Open Group — connect with as many people as you want.

Voice Messages: Sometimes, a text just isn’t enough. Send something a little more personal — it’s okay, you’re still private. Session lets you send voice messages, so nothing gets lost in translation.

Attachments: Don’t leak those docs. Send all your files, images, and attachments through a network that takes your privacy seriously.

  • No Phone Numbers – No identification is required to create a Session account.
  • No Data Breaches – Session doesn’t collect data, so there’s nothing to leak.
  • No Footprints – Send messages through our onion routing network and leave no trace.
  • Open Source – Session’s code has nothing to hide. Anyone can view, audit and contribute.
  • Sync Across Devices – One account, many devices. Session works wherever you go.
  • Censorship Resistant – With no central point of failure, its harder to shut Session down.

Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining!
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to

Light Phone 2

  • On ·
  • By ·

A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone that actually respects you. It can call, text and set alarms. It also has a hotspot functionality.

The Light Phone II is built around a user-customizable toolbox where you will be able to easily add or remove various tools using the Dashboard. The tools are completely optional, of course.

The Light Phone II will never have feeds, social media, advertisements, news or email. All of the tools are custom designed for Light OS. There is no infinity, just intention.


Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in
Aurora Store is an alternate to Google's Play Store, with an elegant design, using Aurora you can download apps, update
You may know Ka-Bar for high quality military, hunting, sporting, all-purpose utility, and outdoor survival knives. The KA-BAR Lake Effect
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It's focused on the research
Sheepdog Response's Tactical Trauma Response Care course is open to anyone. No experience is necessary, and no medical equipment is
RAPiD Safe AR Wall Lock with RFID RAPiD Safes accommodating most AR-15 and AR-10 platforms, mount this safe in a
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
Highland Canine Training provides top quality personal protection dogs to protect your entire family. A protection dog, while obedient guardians,
The EDEC USB Data Blocker protects your devices from hacking and viruses while charging from untrusted USB ports. The USB

Punkt. MP02

  • On ·
  • By ·

Introducing the Punkt. MP02 4G mobile phone.

The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use and features excellent audio quality and battery life: a phone that works as a phone, with up-to-the-minute styling and an interface that is elegant and efficient.

When it’s time to get online, the MP02’s 4G LTE connection can be shared with a tablet/laptop – which means easier typing in comparison with a smartphone, and a bigger screen. This two-device approach means that the Internet is something you dip into, rather than the other way round.

Focus is at a premium in the digital age. The MP02 4G mobile phone makes it easier to be where you are, whether that’s a family weekend away or an important business meeting. It gives you freedom from a constant onslaught of designed-for-addiction notifications and other distractions. It puts you in charge.


Inspired in the ways of the medieval Knights Templar, this service was created to provide an anonymous and end-to-end encrypted email to anyone who needs
εxodus - the Privacy Auditing Platform for Android Applications εxodus analyses Android applications. It looks for embedded trackers and lists them. A tracker is a
Kill Chain: The War on Democracy In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes.
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” - former Google CEO
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining!
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to