Blue Yonder Travel Hoodie

  • On ·
  • By ·

The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count on the Blue Yonder Hoodie to take the turbulence out of travel.

Looks far more professional, thanks to a subtle honeycomb texture and heathered color that’s classy enough for a client meeting. Better yet, it’ll keep all your travel essentials at hand with 4 pockets outside and 7 inside – even includes an RFID wallet to prevent high-tech thieves from scanning your credit card and passport data.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Silent Pocket Passport Wallet

  • On ·
  • By ·

The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of airports, this is designed with the savvy traveler in mind, focused on a minimal layout, real cow leather and the added benefit of RFID security.

You are now free to travel with ultimate peace of mind. Two styles available: Simple featuring two angled passport slots and Traditional with one angled passport slot and cards slots.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

3M Gold Privacy Filters

  • On ·
  • By ·

The gold standard in privacy.

Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper image. Privacy has never looked better. The unique glossy gold finish lets you see a clean, crisp image while prying eyes from the side only see a vibrant gold shield.

Features:

  • Effective privacy outside the 60 degree center viewing angle
  • Great for high-resolution displays
  • Gold, glossy finish for incredible clarity
  • Reversible to a glossy black
  • Reduces 35% of blue light transmission from the display
  • Helps protect from everyday dust and scratches
  • Multiple attachment options
  • Easy to attach, remove and clean


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

The Path to Privacy: Stopping Face Surveillance in California

  • On ·
  • By ·

Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the very Californians most vulnerable to our current public health crisis.


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Aurora High Security Paper Shredder

  • On ·
  • By ·

The Aurora AU1210MA 12-Sheet micro-cut paper/ CD/ credit card shredder with 5.0-Gallon PULLOUT basket is the perfect business and home office device to keep you safe from identity theft.

The AU1210MA accepts up to 12 sheets of paper at a time and shreds them into small pieces (5/32 by 15/32 inches), security level P-4. In addition to paper, the AU1210MA shreds CDs/DVDs/credit cards, keeping vital information from falling into the wrong hands.

Features:

  • High security micro-cut: Provides ultimate protection with particles 6 times smaller than typical cross-cut
  • 12 sheet capacity; destroys CDs, DVDs, credit cards and small paper clips
  • Shreds paper, CDs, DVDs, credit cards into small pieces (5/32 by 15/32 inches), security level P-4
  • Nonstop 60-minute continuous run time
  • Anti-jam auto-reverse to clear paper jams; ultra-quiet operation
  • 5.0-Gallon pullout bin with LED indicator lights standby/ overheat/ bin-full/ overload/ door open status


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Silent Pocket Faraday Phone Sleeve

  • On ·
  • By ·

Silent Pocket’s flagship Faraday sleeves give anyone the ability to disappear from the grid with our patented radio frequency (RF) Faraday cage. Signal Blocking Device Shielding for most phones for Travel, Privacy, Anti-Hacking.

Instantly enhances your daily privacy, security and health. By placing a phone or device inside you are blocking Cellular, GPS, WiFi, Bluetooth, RFID and NFC, EMR, EMF and Radiation.

This is soft case is made for when you want to disconnect, and be undetectable, untraceable and unhackable.

Choose from smooth durable waterproof nylon in three color options or black top grain cow leather. Each variation features the quick action patented Faraday cage and external non-shielded pocket. All discreetly branded with clean embossing and silicone labels. Now you can instantly go off the grid anytime, anywhere – in style.

  • Blocks connectivity to Cellular, WiFi and Bluetooth on any phone, in any country, or any network
  • Blocks GPS tracking and GEO location
  • Protects against identity theft, cell phone spying, eavesdropping on microphone and camera
  • Blocks RFID chips in passports and credit cards
  • Blocks electronic car key fobs from hacking
  • Shields against EMR radiation and static shock


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Standard Notes

  • On ·
  • By ·

A free, open-source,
and completely encrypted notes app.

A writing experience unlike any other. Standard Notes is free to use on every platform, and comes standard with cross-platform sync and end-to-end privacy.

100% Private. Your notes are encrypted and secured so only you can decrypt them. No one but you can read your notes.

Simple. Keeping our app simple means you’ll spend less time fighting and more time writing. It’s faster and lighter than most notes apps.

Powerful Extensions. Compose any kind of note, from rich text, to Markdown and code. Change the mood and find new inspiration with beautiful themes.

Long-lasting. Our apps are built carefully to optimize overall lifetime and long-term survivability.

  • Always Free
  • AES-256 encryption. No one but you can read your notes.
  • Easy to use, open-source apps on Mac, Windows, iOS, Android, and Linux
  • Automatic sync with no limit on data capacity
  • Unlimited devices
  • Web access & Offline access


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Mojave Faraday Travel Case

  • On ·
  • By ·

Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone during airport travel, commuting, and busy locations.

Mojave Travel Case shields cell phones or electronic devices in faraday sleeve compartment while keeping frequently used accessories organized in separate unshielded compartments. The faraday sleeve shields electronic devices from ALL wireless signals so they cannot be hacked, tracked, or digitally altered.

The frarady compartment provides 100% shielding from:

  • WiFi (2.4 & 5GHz)
  • Bluetooth
  • cellular signals (4G LTE+)
  • GPS
  • RFID
  • RF signals with 60-80dB average attenuation.


Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.
Mojave Faraday Travel Case
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone Read more.
Trezor One Cryptocurrency Wallet
TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while Read more.

Silent Pocket Faraday Laptop Sleeve

  • On ·
  • By ·

The Faraday Laptop and Tablet Sleeve will instantly enhance your daily privacy, security and valuable data stored on your computer or tablet. Made of durable waterproof woven nylon or real cow leather with our patented Faraday cage embedded inside. It’s a stylish, convenient accessory that gives you daily peace of mind. Instantly block ALL Wireless Signal, Cellular, GPS, WiFi, Bluetooth, RFID and NFC.


Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.
Mojave Faraday Travel Case
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone Read more.
Trezor One Cryptocurrency Wallet
TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while Read more.