SimpleLogin

  • On ·
  • By ·

Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using email alias. Either way you’re going to be surprised by what an email alias can do!

Privacy, security and features you’ll love. SimpleLogin is the most advanced email alias solution. Features:

  • 100% open source
  • Custom domain
  • Multiple mailboxes
  • PGP Encryption
  • Much more…

Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

Winston Privacy Filter

  • On ·
  • By ·

Protect your family from online spying and identity theft with Winston’s VPN alternative.

Winston is a hardware filter that protects your privacy online. Winston strips away corporate tracking and surveillance that invades your privacy and makes the internet slower.

Winston delivers true online privacy in a way that a VPN and ad blocker can’t. Enjoy a faster, cleaner, and safer browsing experience on all your devices.

Features:

  • Easy plug and play setup
  • Faster than a VPN
  • Stronger than a browser plugin
  • Stops tracking in its tracks
  • Blocks those annoying ads

Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

Octopus: Truly Decentralised Identity

  • On ·
  • By ·

Octopus.sh is a unique company offering market-leading identity management technology.

The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities that lets everyone be who they want to be. Connect a Persona with customers, friends and organization in both private and public networks. Securely share verified identity, attestations and all other private information Artefacts.


Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

AnonAddy Anonymous Email Forwarding

  • On ·
  • By ·

AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal information. Email forwarding allows you to take back control of your email traffic by:

  • Protect your real email address from spam by simply deactivating/deleting aliases that receive unsolicited emails.
  • Identify who has sold your data by using a different email address for every site.
  • Protect your identity in the event of a data breach by making it difficult for hackers to cross-reference your accounts.
  • Prevent inbox snooping by encrypting all inbound emails using GPG/OpenPGP encryption.
  • Update where emails are forwarded without having to go through and change your email address for each site individually.
  • Reply to forwarded emails anonymously without revealing your true email address

Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

The diaspora* Project

  • On ·
  • By ·

The online social world where you are in control

Most social networks are run from centralized servers owned and run by a corporation. These store all the private data of their users. This information can be lost or hacked, and like any system with a bottleneck, any problem at the central servers can make the whole network run very slowly, or not at all. It is also more easy for governments to “listen in.”

diaspora* is a true network, with no central base. There are servers (called “pods”) all over the world, each containing the data of those users who have chosen to register with it. These pods communicate with each other seamlessly, so that you can register with any pod and communicate freely with your contacts, wherever they are on the network.

The diaspora* Project is based on three key philosophies:

  • Decentralization
  • Freedom
  • Privacy

Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

Better Blocker: Privacy Tool for Safari

  • On ·
  • By ·

Better is hand-crafted by Ind.ie, a tiny two-person-and-one-husky not-for-profit striving for social justice in the digital network age. Unique blocking rules for Better based on the principles of Ethical Design.

Better is a privacy tool for Safari that protects you from trackers and privacy-eroding ads on the web. Make your web experience safer, lighter, and faster in Safari on iPhone and iPad.

How is Better different?

  • Blocks tracking scripts, tracking pixels, and behavioural advertising.
  • Uses a unique, hand-curated, and open tracker database. Browse the encyclopaedia-like tracker entries on their web site if you fancy learning more.
  • Identify and block the most prevalent trackers. This makes Better’s block list lightweight and effective.
  • Blocking decisions based on the principles of the Ethical Design Manifesto.
  • Open, transparent, and free as in freedom.

Other features:

  • Improves the readability of popular web sites.
  • Spotlights the worst offenders… Did you know that the worst site we found on the web had 172 trackers? Better blocks them all and makes that site 4× lighter and 15.8× faster!
  • Blocks blocker blockers (try saying that quickly a few times!) Whenever we can, we try to protect you from sites that try to put you at risk by forcing you to turn off your privacy tools.
  • Do Not Block list enables you to turn Better off for sites that don’t play well with Better. Easily contact us about those sites so we can fix the experience for everyone.

Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

The Mastodon Project

  • On ·
  • By ·

Social networking, back in your hands: Follow friends and discover new ones among more than 2.2M people. Publish anything you want: links, pictures, text, video. All on a platform that is community-owned and ad-free.

Find your perfect community: Mastodon isn’t just a website, it is a federation—think Star Trek. Thousands of independent communities running Mastodon form a coherent network, where while every planet is different, being part of one is being part of the whole.

Safer social media experience: Mastodon comes with effective anti-abuse tools to help protect yourself. Thanks to the network’s spread out and independent nature there are more moderators who you can approach for personal help, and servers with strict codes of conduct.

Sharing your thoughts has never been more convenient: You have 500 characters. You can adjust the thumbnails of your pictures with focal points. You can use custom emojis, hide things behind spoiler warnings and choose who sees a given post. Messed it up? You can delete & redraft for quick corrections.


Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

anonymoX

  • On ·
  • By ·

Protect your privacy: Change your virtual identity with just one click. Install the free addon for Firefox or Chrome and activate it. Then choose a different IP and country.

Surf anonymously: Join a network of proxys and be part of more than 0.3 million protected indistinguishable internet users. Stay anonymous with anonymoX.

Visit blocked sites: Bypass many kinds of blocks by jelling a virtual identity in another country and bypass GEO IP blocks.

Change your IP: Access websites with one of our IPs. Instead of accessing the website directly use an IP address of one of our proxy networks.


Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

Eprivo Private Email

  • On ·
  • By ·

Sign up for Eprivo’s free private email account service and retain your current email address. Get the most secure email service whilst sticking with your current provider.

Use Your Email Address: EPRIVO is the only private email account service that secures your existing email address. It does not store emails keeping security and email provider separate. It pioneers physical security, avoiding vulnerabilities with digital security alone.

Pioneering Privacy Controls: Add industry-unique privacy controls for each sent private email, enabling full sender-control in both cloud and recipients’ devices. Secure emails can be recalled to make them vanish anytime.

Secure Any Old Email: Origin and content of each private email is authenticated. Past emails from any account can be privatized – archived and encrypted – only in EPRIVO. Regular emails are ranked for privacy sensitivity.


Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of

Jumbo: Privacy Assistant App

  • On ·
  • By ·

If there is one app for all your privacy needs, Jumbo might be it! Jumbo is a simple and efficient interface to manage all your privacy needs in one place.

Jumbo manages your privacy on:

  • Facebook
  • Google Search
  • Twitter
  • Alexa
  • New apps are being added every week.

Clean your digital life in seconds.

Jumbo Cleaning Mode saves hours of manual work to backup then remove old Facebook photos (coming soon), tweets, Google Searches, Alexa queries…

Smart Privacy Settings For Facebook.

We have designed this revolutionary feature that can protect your privacy by changing your Facebook privacy settings, in one-tap.

Select the privacy level you are comfortable with, Strong, Medium or Weak, and Jumbo changes more than 30 settings for you automatically.

Private and Secure. By Design.

Jumbo works uniquely from your iPhone, without any server-side processing. No login required.

All the intelligence is powered by your Apple device. Jumbo can not access any of your personal data, or track your personal behaviour.


Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network,
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Don't lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the
Protect your family from online spying and identity theft with Winston's VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security,
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you.
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
AnonAddy is an anonymous email forwarding service. This can be an extremely useful tool to increase your online privacy and maintain control of your personal
The Citizen’s Privacy Manual explains the following: How to buy and establish a computer that cannot be traced to youHow to buy and establish a
Code 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film
Introducing the Punkt. MP02 4G mobile phone. The Punkt. MP02 minimalist phone is built for connecting with people. It’s comfortable to hold and to use
The online social world where you are in control Most social networks are run from centralized servers owned and run by a corporation. These store
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
The security experts over at Heimdal Security help protect users and companies from cyber criminal. They are one of the fastest growing companies in the
Be Smart. Shop Safe. The holiday shopping season is just around the corner. Get educated on the vulnerabilities of new products you are thinking of