Advertisement
ArizonaMilitia

EPIC Online Guide to Practical Privacy Tools

Jul 10th, 2015
1,226
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.15 KB | None | 0 0
  1. EPIC Online Guide to Practical Privacy Tools
  2. CD/USB Based Operating Systems | Internet Anonymizers, Virtual Private Networks (VPNs) and Proxy Servers | Web Browser Ad-ons | Search Engines | Email Encryption | Alternative Email Accounts | Anonymous Remailers | Disk/File Encryption | Secure Instant Messaging | Disk/File Erasing Programs | Password Vaults | Firewalls | Antivirus | Cookie/Cache/Internet History Cleaners | Mobile Privacy | VoIP/Video Messaging | Social Networking | Meshnet | Alternative Currencies | Publishing | Temporary Mobile Phones | Heartbleed | Additional Resources |
  3. Disclaimer: EPIC does not lobby for, consult, or advise companies, nor do we endorse specific products or services. This list merely serves as a sampling of available privacy-enhancing tools. If you have a suggestion for a tool that you believe should be included, or if you have comments to share regarding one or more of the tools that are already listed, send e-mail to [email protected]. If you have questions about a tool on this page, visit the affiliated company or individual's Web site for more information.
  4.  
  5. CD/USB Based Operating Systems
  6. Tails: live operating system that can run from removable media without leaving tracks. Routes Internet traffic through the Tor network.
  7. Internet Anonymizers, Virtual Private Networks (VPNs) and Proxy Servers
  8. Tails: live operating system that can run from removable media without leaving tracks. Routes Internet traffic through the Tor network.
  9. Tor (Windows, OSX, GNU/Linux, BSD, Unix): Internet anonymizing software that securely routes traffic through multiple nodes around the world. Open source, free.
  10. Orbot (Android): Tor client for Android.
  11. Anonymizer(Windows, OSX, Linux, iPhone, iPad, Android): Encrypts and anonymizes Internet traffic.
  12. CyberGhost VPN
  13. IPreadator
  14. I2P Anonymous Network
  15. Private Internet Access
  16. proXPN
  17. StrongVPN
  18. torVPN
  19. TorGuard
  20. VyprVPN
  21. WiTopia
  22. Proxy.org: lists thousands of proxy sites.
  23. Proxify
  24. TunnelBear (Windows, OSX, Android, iOS)
  25. Web Browser Ad-ons
  26. HTTPS Everywhere (Firefox, Chrome): forces HTTPS versions of websites were they are available.
  27. Adblock Plus (Firefox, Chome, Opera, Android): customizable ad-blocking plugin
  28. NoScript (Firefox, derivatives of Mozilla): highly customizable plugin to selectively allow Javascript, Java, and Flash to run.
  29. Disconect (Firefox, Chrome, Safari, Opera): stops 3rd party tracking sites around the web.
  30. BetterPrivacy (Firefox): removes and deletes long-term “super-cookies”
  31. Search Engines
  32. DuckDuckGo: anonymous, encrypted web searches.
  33. ixquick: anonymous, encrypted web searches. Hosted in the Netherlands.
  34. Email/Communication Encryption
  35. GPG(Windows, OSX, Linux): free implementation of OpenPGP.
  36. Mailvelope(Chrome, Firefox): OpenPGP encryption for webmail.
  37. Enigmail is and OpenPGP add-on for the Thunderbird and SeaMonkey email clients.
  38. GPGMail is a plug in for Apple Mail, an open source implementation of OpenPGP for encrypting, decrypting, signing and verifying email.
  39. Email Self Defense: a guide for using encrypted email (GNU/Linux, Mac OS, Windows).
  40. Alternative Email Accounts
  41. Guerrillamail: web-based disposable email accounts.
  42. Tor Mail: anonymous email provider (Tor required).
  43. CounterMail
  44. MyKolab: Privacy-focused email, based in Switzerland
  45. Neomailbox: email provider focused on privacy and anonymity, based in Switzerland
  46. Anonymous Remailers
  47. QuickSilver (Windows)
  48. paranoia remailer
  49. Mixmaster
  50. noreply: additional information on remailers.
  51. Disk/File Encryption
  52. Symantec Drive Encryption (Windows): Uses strong PGP encryption.
  53. Diskcryptor (Windows): Free, open-source, encryption solution
  54. FileVault 2 (Mac): Built-in encryption software used by NSA to lock down their systems
  55. Linux Unified Key System (Linux): Open-source option for full disk encryption
  56. cryptonite (Android): implementation of TrueCrypt for android
  57. GNU/Linux disk encryption through Ubuntu: a how-to guide from EFF.
  58. Secure Instant Messaging
  59. Cryptocat (Chrome, Firefox, Safari, Mac): encrypted instant messaging platform.
  60. Off-the-Record (Windows, Pidgin): encrypted communications with authentication and deniability features.
  61. TorChat (Windows, Linux): P2P instant messaging routed through the Tor network.
  62. Pidgin is a third-party instant messaging/chat program that allows users to log in to multiple chat programs simultaneously (e.g., AIM, MSN, Google Talk) and to install a variety of privacy and security plugins.
  63. Adium is a third-party instant messaging program that allows for encrypted chats across multiple networks, but for Macs.
  64. Disk/File Erasing Programs
  65. Darik's Boot and Nuke: self-contained bootable software that deletes all contents of attached drives.
  66. Eraser: file-erasing software.
  67. Ative @ Killdisk: bootable whole disk eraser.
  68. CCleaner: Internet history and file shredder.
  69. Password Vaults
  70. Password Safe (Windows)
  71. Lastpass (Windows, OSX, Linux, Chrome, Firefox, Safari, Opera, iOS, Android, Blackberry, Windows Mobile)
  72. 1Password (Windows, OSX, Android, iOS)
  73. MasterPassword (iPhone/iPad, OS X, Destop (Java), Terminal (Java), Terminal (C)).
  74. Firewalls
  75. ZoneAlarm
  76. Comodo (Windows, Android)
  77. Kapersky: (Windows, OSX)
  78. TinyWall (Windows)
  79. Norton Internet Security (Windows)
  80. Antivirus Software
  81. AVG (Windows, Android, iOS, Windows Mobile)
  82. ClamXav (OSX)
  83. Norton Antivirus (Windows)
  84. Bitdefender (Windows, Android)
  85. Comodo (Windows, OSX, Linux, Android)
  86. Ad-Aware (Windows)
  87. Avast (Windows, OSX, iOS)
  88. F-Secure (Windows, OSX, Android)
  89. Panda Cloud Antivirus (Windows)
  90. Avira (Windows, OSX)
  91. Cookie/Cache/Internet History Cleaners
  92. CCLeaner (Windows, OSX)
  93. Bleachbit (Windows, Linux)
  94. Mobile Privacy
  95. SilentCircle (iOS, Android): encrypted voice, video, text, and file communications
  96. Wickr (iOS, Android): encrypted, self-destructing text, picture, audio and video messages.
  97. RedPhone/TextSecure (Android): open source application for encrypted voice and text communications.
  98. K-9 Mail (Android): open source mail app for android that supports PGP.
  99. iPGMail (iOS): app to send and decrypt PGP-encoded messages.
  100. DuckDuckGo Search and Stories (Android): Secure, anonymous searches with Tor/Orbot integration.
  101. ChatSecure is an encrypted chat client for Android and iPhone.
  102. Encrypt your Android phone.
  103. CyanogenMod open-source alternative: to avoid leaving your phone vulnerable to your carrier's customization of the Android OS, consider replacing the firmware (on select phone models) with CyanogenMod.
  104. Orbweb is an exceptionally privacy-focused web browser for Android, based on Tor.
  105. APG is an OpenPGP implementation for Android phones.
  106. VoIP/Video Messaging
  107. Jitsi (Windows, OSX, Linux): open source software for encrypted video, audio calls.
  108. Silent Circle (Windows)
  109. Social Networking
  110. Diaspora: alternative social media; open source and allows users to own and control personal data.
  111. buddycloud: decentralized social networking with strong privacy controls.
  112. Meshnet (decentralized networks)
  113. Hyperboria: encrypted, decentralized Internet alternative .
  114. GNUnet: encrypted, anonymous, decentralized P2P networking.
  115. Commotion: open-source tool that uses phones and computers to create mesh networks.
  116. Alternative Currencies
  117. Cash: the original anonymous currency.
  118. Bitcoin: open source, P2P digital currency.
  119. Publishing
  120. Pastebin: multi-purpose text publishing.
  121. Strongbox: for submitting files to The New Yorker.
  122. Wikileaks: for submitting classified/sensitive information.
  123. Temporary Mobile Phones
  124. Burner Phone
  125. Heartbleed
  126. The Heartbleed Bug: Heartbleed FAQ.
  127. Heartbleed Test: Enter a URL or a hostname to test the server for CVE-2014-0160.
  128. The Heartbleed Hit List: The Passwords You Need to Change Right Now: Mashable's comprehensive guide to the sites affected by Heartbleed and recommended next steps.
  129. Additional Resources
  130. Prism Break: comprehensive list of privacy software and services.
  131. The Ultimate Privacy Guide
  132. Encrypt All the Things: seven security-enhancing steps that every internet platform should take
  133. The Surveillance Self Defense Project: a guide from the Electronic Frontier Foundation.
  134. Two-factor authentication adds additional security to your accounts, it available. Simply put, if an outsider has one of your forms of authentication (e.g., your password) it won’t be enough to open your account.
  135.  
  136. https://epic.org/privacy/tools.html
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement