A collection of interesting networks and technology aiming at re-decentralizing the Internet.
Why Privacy is more than Crypto
The future of the open internet — and our way of life — is in your hands
Basic security precautions for non-profits and journalists in the United States, mid-2017.
Buscador is a Linux Virtual Machine that is pre-configured for online investigators. It was developed by David Westcott and Michael Bazzell, et al
Bromite is Chromium plus ad blocking and privacy enhancements; take back your browser!
Alternatives to Google Products – The Complete List
Free Public Transport Assistant without Ads or Tracking
All preferences for the DNS-over-HTTPS functionality in Firefox are located under the "network.trr" prefix (TRR == Trusted Recursive Resolver). The support for these are targeted for shipping in release Firefox 62.
It is a blessing when a messaging app like Briar exists in a world where keeping online data privacy is too mainstream. It secures online users from anonymous hackers when using social media platforms.
Firefox Is Back. It’s Time to Give It a Try.
Mentat is a group chat #application
with a focus on message #tagging
and privacy. It allows deep categorization and retrieval of messages based on tags (a la Twitter hashtags). It also aims for reasonable #privacy
, meaning everything aside from feature metadata is end-to-end encrypted with OpenPGP, including avatars. Feature metadata is anything that the server depends on in order to deliver a feature; tags are stored in plaintext in order to index and retrieve them from the database, and URLs are sent as plaintext so the server can ping them and generate a thumbnail.
. ENCRYPTED #MESSAGING
ISN’T MAGIC - ENCRYPTED #COMMUNICATION
USED to be too complicated for mainstream use, but approachable apps like WhatsApp and Signal have become a no-brainer for digital privacy. With all of their security-minded features, like disappearing messages and identity-confirming safety numbers, secure chat apps can rightfully give you peace of mind. You should absolutely use them. As the adage goes, though, there's no such thing as perfect security.