online & computer PRIVACY 

Online privacy tools keep your browsing, searching, shopping, and blogging and even the internet connection itself private or anonymous and let YOU choose what information gets collected online. These tools can tell you when your info is being collected, stop it, and even remove your personal data from the web. Online privacy tools you will find here include anonymous search engines, tracker blockers, masked online shopping services, anonymous search engines, overseas private website and domain hosts, proxies and virtual private networks.


INTERNET INFORMATION REMOVAL RESOURCES

Remove your leaked personal data from search engines, people databases, social media and the deep web. Do it yourself or use professional services who will remove it for you. 

Safe Shepherd

Safe Shepherd is the go-to for preventing stalking, identity theft, fraud, etc... It is a tried and true removal service that allows you to track the progress of your info removal. They offer professional help removing your info from some of the most hard to remove sites on the internet. Safe Shepherd is a specialized service focusing exclusively on these services. Others offering a similar service are Abine.com Delete Me and internetinformationremoval.com. Do it yourself? Refer to Safe Shepherd Privacy Manual, and these  Reddit Threads


Laptop Cases for privacy and security

Laptop cases

Use these device cases to protect from being tracked, hacked, or stalked.

Paraben StrongHold bags are use typically by law enforcement and forensics for their patented* design which blocks out wireless signals from cell towers, wireless networks, and other signal sources that could threaten digital evidence. These cases block all incoming communications which they use to stop the contamination of evidence or wireless sending of wipe commands. The perfect privacy enhancing technology. It uses a special tri-weave material made of a nickel and silver plated nylon plain woven fabric. This fabric and design are key in preventing unwanted signals from reaching your device.


computer operating systems for privacy

UBUNTU

Ubuntu is a free and open sourced Debian-based Linux operating system, with Unity as its default desktop environment. It is named after the Southern African philosophy of ubuntu (literally, "human-ness"), or "the belief in a universal bond of sharing that connects all humanity". This operating system works very similar to mac or windows but without the privacy compromises and allowing users to encrypt the home and private directories.

whonix

Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. A web browser, IRC client, word processor, and more come pre-configured with security in mind. It is a complete operating system designed to be used inside a host operating system. It is Free Software and based on Tor, Debian GNU/Linux and security by isolation. -Whonix.

live operating systems for more privacy

Live operating systems are those that operate from an external drive such as a CD, USB, or other.

TAILS

The Amnesiatic Incognito Live System! Used successfully by Snowden to break news to the Guardian about NSA Prism Program. "Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux. Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.

It aims at preserving your privacy and anonymity, and helps you to:

  • use the Internet anonymously and circumvent censorship;
  • all connections to the Internet are forced to go through the Tor network;
  • leave no trace on the computer you are using unless you ask it explicitly;
  • use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging."

Jondo live

Jondo Live-DVD offers a secure, pre-configured environment for anonymous surfing and more. It is based on Debian GNU/Linux. The live system contains proxy clients for JonDonym, Tor Onion Router and Mixmaster remailer. JonDoFox is a pre-configured browser for anonymous web surfing and TorBrowser is installed too. Thunderbird for e-mails, Pidgin for anonymous instant messaging and chats, Parole media player, MAT for cleaning documents and more application, TorChat, LibreOffice.org, GIMP, Calibre for eBooks and some other tools. 


vpn's and Proxies

Just putting your browser in "private mode" will keep cookies and history from being saved on your computer, but it wont keep your Internet Service Provider and the NSA from spying on you. You need to encrypt your interenet connection and mask your IP Address. Unencrypted and unmasked, your Internet Service Provider spies on you, analyses your data and reveals personally identifiable information about you to the public. Some Internet service providers include your name, email, and phone number in your IP Address. Solutions to this are using a proxy or VPN. Using them is easy and effective. Read more>>>

NORD VPN

Nord VPN is a Virtual private network located in Panama, Outside US and EU jurisdiction where there are no data retention laws. It uses double layer encryption with RSA-2048 / AES-256 and tor. If it disconnects, it has an internet kill switch and DNS leak protection to protect from any leaks, it also has a no log policy regarding users data so not much to turn over to anyone.

PROXY.SH

Proxy.sh is a virtual private network located in Seychelles which is also outside the US & EU jurisdiction where there are no data retention laws. It uses RSA-4096 / AES-256 encryption and an internet kill switch plus DNS leak protection to protect from any leaks. They also have a no log policy regarding users data so not much to turn over to anyone.

TOR

Tor is a proxy that has been around a long time. It is a free and opensource privacy tool that "protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location."

proxysite

ProxySite is a website that allows you to visit other websites by typing them into a URL bar on the page. You can visit Facebook or Youtube through ProxySite and remain anonymous.


 encrypted overseas email providers

UNSEEN

Unseen has a anonymous video calling service, or encrypted skype that uses an encryption and key exchange that is not created by the National Institute of Standards in Technology (NIST). This gives a much better chance that the NSA does not have backdoor or has cracked it. They are based in Iceland which is outside of the US and EU Jurisdiction. Read more about their encryption here>>>

PROTONMAIL

This email service was developed by a group from MIT and CERN. It's a secure, encrypted email using end-to-end encryption and user authentication protocols so rigorous even the creators can't read user emails. ProtonMail hosts its servers in Switzerland... so all user data is protected by strict Swiss privacy laws and allows you to encrypt messages that others can decrypt using just a password you give them.

STARTMAIL

StartMail uses an advanced encryption technology to stop hacking and mass surveillance. StartMail was built from scratch. they offer secure data storage, disposable email addresses, easy‐to‐use ‘one‐click’ encryption, and are based in Switzerland outside the US and ER jurisdiction.

riseup

Riseup is an email provider for activists, by activists. Though their servers are located in the US jurisdiction, they are fully encrypted and privately owned and they do not keep any passwords of users which law enforcement can use for decryption of information. Accounts must be approved by the collective before using their service. their purpose is to promote self-determination, interdependence, free societies etc...


online shopping privacy

ABINE

Abine is a provider for masked online purchases among other things. Their service works by charging your card for the amount of your transaction and then generating a single use card number, CVV, expiration date, (which uses their billing address) and you can put whatever name you would like. The only information that shows up on in your bank account is a charge by Abine.com. They are a US based company and are required to keep financial records and will turn them over under court order. This is NOT a service for criminal activity but it IS a solution to unwarranted mass surveillance of peoples financial activity. They also provide clients with services for masked email, masked phone number, tracker blocker, password manager and internet information removal.

SIMON VISA GIFT CARD

Simon Visa Gift Card is a non reloadable prepaid visa gift card that can be used at all merchants that accept visa. A great alternative to banks. This will let you make online purchases with privacy. Note: will not help with masking physical addresses in shipping of products. They take up to $500, accept cash, and don’t ask for a name, nor address or SSN to set up. Their malls are everywhere and web interface lets you connect any name and address you want to each card, so you can use them with merchants that do AVS checks which means anonymous online purchases.

VISA VANILLA

Visa Vanilla is a pre-paid credit card that offers anonymity with financial transactions and can be purchased cash requiring no personal identifying information from most corner stores, drug stores and grocery stores in the US. It can be used with almost all merchants where visa is accepted but require registration online through their website to use in online transactions. Can be loaded in amounts between (20 500 dollars). Tip: Pay for gas inside or it will automatically charge $75 to your card. They also cannot be reloaded.

Alternative currencies

Forms of alternative currencies include crypto-currencies, mutual credit systems, vouchers, local currencies, barter systems, and time exchanges to name a few. Visit our alternative currencies page to find financial instruments which are more conducive to privacy and liberty.


anonymous search engines

Alternatives to Google, Bing, Yahoo and the rest. 

STARTPAGE

StartPage is an anonymous alternative to mainstream search engines that has the highest SSL encryption score in the Industry. It pulls up Google search results using "Perfect Forward Secrecy" in combination with a more secure version of SSL encryption known as TLS 1.1. and 1.2, which works by setting up a secure "tunnel" through which users' search traffic cannot be intercepted by the NSA. they do not use cookies, record your IP address or save any of your search history. They even allows you to view pages through a proxy to keep sites from collecting this information about you.


If you wish to compare it to Google Search Engine, this search bar will open in a new window. To compare search results simply go to google.com and enter the same keywords.

DUCKDUCKGO

DuckDuckGo is another anonymous alternative to Google, Yahoo and the rest. It is a little bigger than StartPage with great search results and maps showing locations of your searches if available.. Again, no saving search history, using cookies, or recording IP addresses.

disconnect search

Disconnect Search lets you search through other search engines of your choosing such as Google, Yahoo, Bing,  DuckDuckGo etc.... It keeps you and your browsing anonymous and masks your IP address, cookies, and all other personal info.


Private overseas webhosting

ORANGE WEBSITE

Orange Website lets you have a website that is not NSA friendly. It is a Web Hosting and Domain Name Server. Their servers and headquarters is in Iceland which is outside of the US and EU jurisdiction. Their service was specifically designed to"provide everyone in the world an equal opportunity to publish their words freely without being harassed or censored" and is "for people who are concerned about security and privacy matters."They have one click install for wordpress, accept bitcoin and keep info confidential.

UNSEEN

Unseen is a Webhost and Domain Name Server created by the creators of Beforeitsnews.com in response to revelations about censorship and NSA monitoring of personal data. It began in the US and quickly moved it's servers and headquarters to Iceland for to offer greater privacy protection.They keep your information confidential and are about a 2 click install for WordPress.


privacy friendly password managers

abine

Abine is a privacy company with a number of diverse services. One of which is a password management service. They give you the option of storing it in the cloud or locally on your computer in which case they said they dont even have access to recover passwords if lost.

KeePass

KeePass is  free open source password manager. KeePass stores all your passwords locally in an encrypted database locked with a master key. The databases are encrypted with: AES and Twofish, which are two of the best military grade encryption standards. It is available for  Windows, iOS, Android, Mac, and Linux.

encryptr

A password manager and e-wallet that is free, open source, zero-knowledge. Cloud-based. Private. Enough said.

Master Password

Master Password is a bit different than your typical password manager. Users only need one master password and generates unique passwords for each site based on an algorithm that guarantees from your name, the site and your master password. It doesnt store you passwords, there is no syncing, backups or database. It is just an algorithm. Brilliant idea and any other password manager can be used in conjunction with it too. Available for Windows, Mac, Linux, iOS, Android, Web.


tracker blockers

privacy badger

Privacy Badger is a browser-add on tool that analyzes sites to detect and disallow content that tracks you without your consent. Privacy Badger keeps note of the "third party" domains that embed images, scripts and advertising in the pages you visit. If a third party server appears to be tracking you without permission, by using uniquely identifying cookies to collect a record of the pages you visit across multiple sites, Privacy Badger will automatically disallow content from that third party tracker. In some cases a third-party domain provides some important aspect of a page's functionality, such as embedded maps, images, or fonts. In those cases Privacy Badger will allow connections to the third party but will screen out its tracking cookies. ~alternatives-to.

ghostery

Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity. 
After showing you who's tracking you, Ghostery also gives you a chance to learn more about each company it identifies. How they describe themselves, a link to their privacy policies, and a sampling of pages where they can be found. Ghostery allows you to block scripts from companies that you don't trust, delete local shared objects, and even block images and iframes. ~Alternatives-to.


the darknet

Freenet

Freenet is free software which lets you anonymously share files, browse and publish "freesites" (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, An important recent development, which very few other networks have, is the "darknet": "Darknet" mode, gives users the option of only connecting  to their friends, making it very very difficult to detect. By only connecting to people they trust, users can greatly reduce their vulnerability, and yet still connect to a global network through their friends' friends' friends and so on. Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is. Users contribute to the network by giving bandwidth and a portion of their hard drive (called the "data store") for storing files to make it work. This enables people to use Freenet even in places where Freenet may be illegal, makes it very difficult for governments to block it, and does not rely on tunneling to the "free world". Freenet has been downloaded over 2 million times since the project started, and used for the distribution of censored information all over the world including countries such as China and the Middle East. 

Invisible Internet Project

The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by activists, oppressed people, journalists and whistleblowers, ect... It supports Email: Integrated web mail interface, plugin for serverless email. Web browsing: Anonymous websites, gateways to and from the public Internet. Blogging and forums: Blogging and Syndie plugins. Website hosting: Integrated anonymous web server. Real-time chat: Instant messaging and IRC clients. File sharing: ED2K and Gnutella clients, integrated BitTorrent client. Decentralized file storage: Tahoe-LAFS distributed filesystem plugin. I2P is available on desktops, embedded systems (like the Raspberry Pi) and Android phones. 

tor network

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than four thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity back to the user. Tor is intended to protect personal privacy and ability to conduct confidential business by keeping their internet activities from being monitored.