Light Phone 2

  • On ·
  • By ·

A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone that actually respects you. It can call, text and set alarms. It also has a hotspot functionality.

The Light Phone II is built around a user-customizable toolbox where you will be able to easily add or remove various tools using the Dashboard. The tools are completely optional, of course.

The Light Phone II will never have feeds, social media, advertisements, news or email. All of the tools are custom designed for Light OS. There is no infinity, just intention.


CryptPad is a private-by-design alternative to popular office tools and cloud services. All the content stored on CryptPad is encrypted
The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 5000+ servers
Secure messenger for friends, families and small communities. Wire Personal is a secure, privacy-friendly messenger for personal use. It combines
The Mission Darkness FreeRoam Faraday Belt Bag is a stylish waist pack perfect for travel and everyday wear. The large
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats,
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS
/e/ OS is a complete, fully “deGoogled” version of Android. /e/OS is an open-source mobile operating system paired with carefully
MySudo is your private identity for the digital world. Sudo identities are a digital extension of you that shield your

Punkt. MP02

  • On ·
  • By ·

Introducing the Punkt. MP02 4G mobile phone.

The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use and features excellent audio quality and battery life: a phone that works as a phone, with up-to-the-minute styling and an interface that is elegant and efficient.

When it’s time to get online, the MP02’s 4G LTE connection can be shared with a tablet/laptop – which means easier typing in comparison with a smartphone, and a bigger screen. This two-device approach means that the Internet is something you dip into, rather than the other way round.

Focus is at a premium in the digital age. The MP02 4G mobile phone makes it easier to be where you are, whether that’s a family weekend away or an important business meeting. It gives you freedom from a constant onslaught of designed-for-addiction notifications and other distractions. It puts you in charge.


The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of
The Battle to Control the Design of New Technologies Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance
'Disappear - cover your online tracks' is an independent documentary film questioning digital self-defense and means to take back control of our online privacy. Not
Better is hand-crafted by Ind.ie, a tiny two-person-and-one-husky not-for-profit striving for social justice in the digital network age. Unique blocking rules for Better based on
The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you