This page contains tools and resources for regaining your privacy on and offline. Browse by category or scroll to view complete directory.
Privacy Tools protect you against global mass surveillance and non-consensual monetization of your personal data.Through cellular, WIFI, Blue Tooth, GPS, electronic financial and other networks, everyday, information about your location, identity, relationships, finances, interests, buying habits, and lifestyle is being mined remotely by both public and private entities. Another name for privacy tools is Privacy Enhancing Technologies (PET's). They consist of communication anonymizers, encrypted data storage tools, and tools for protecting your privacy online and in the real world. Read more by clicking the button bellow.
SELECT A CATEGORY
BROWSE ALL PRIVACY TOOLS & RESOURCES
PRIVATE CALLING AND TEXT
Open Whisper Systems
Free and open source apps for making encrypted phone calls and text messages.
An entire communications network based in Switzerland consisting of software, services, and devices built specifically for privacy.
Encrypted Internet Connection
Just putting your browser in "private mode" wont keep your Internet Service Provider and the NSA from spying on you. You need to use a proxy or VPN. Learn more about the IP Address and privacy>>>
IS Your IP Address and location showing?
A VPN based in Panama which encrypts your internet connection and masks your IP Address; stopping tracking of your online activity.
A VPN based in Seychelles which encrypts your internet connection and masks your IP Address; stopping tracking of your online activity.
Tor is a free and open-source privacy proxy tool that bounces your communications around a distributed network of relays preventing seeing what sites you visit, and your physical location.
Email & VIDEO CALLING
An encrypted and overseas email provider based in Iceland which uses an encryption and key exchange not created by the National Institute of Standards in Technology (NIST).
A secure and encrypted email service developed by a group from MIT and CERN based in Switzerland.
Unseen has a free video conference calling app that allows anonymous alternative to skype.
anonymous search engines
"...searches reveal a shocking amount of personal information about you, such as your interests, family circumstances, political leanings, medical conditions, and more. This information is modern-day gold for marketers, government officials, black-hat hackers and criminals - all of whom would love to get their hands on your private search data." Dr. Katherine Albrecht
Another anonymous search engine which again prides itself on no saving search history, using cookies, or recording IP addresses.
ENCRYPTED CLOUD STORAGE
Dropbox or Google Docs are suicide for privacy. There are a number of providers that offer encrypted zero knowledge cloud based storage.
SpiderOak is a zero knowledge encrypted cloud storage. with up to 2 GB is free and you can share files, sync and do backups of computer and phone.
A zero knowledge cloud storage based in Switzerland allowing up to 5 GB free and can sync, share, and backup as well.
Finance and ONLINE Purchasing
A maskingservice for online purchases.They also provide masked email, phone, tracker blocking, password management and internet information removal.
Simon Visa Gift Card
Simon Visa Gift Card is a non reloadable prepaid visa gift card that can be used at all merchants that accept visa. They take up to $500, accept cash, and don’t ask for a name, much less address or SSN. Their malls are everywhere and web interface lets you connect any name and address you want to each card, so you can use them with merchants that do AVS checks which means anonymous online purchases.
Visa Vanilla is a pre-paid credit card that offers anonymity with financial transactions and can be purchased cash requiring no personal identifying information from most corner stores, drug stores and grocery stores in the US. It can be used with almost all merchants where visa is accepted but require registration online through their website to use in online transactions. Can be loaded in amounts between (20 500 dollars). Tip: Pay for gas inside or it will automatically charge $75 to your card. They also cannot be reloaded.
Sovereign Gold Card
Sovereign Gold card offers offshore bank accounts for individuals and business accounts with private debit cards and anonymous prepaid debit cards. Their partner company helps set up foreign corporations.
Private Web Hosting
A Webhost and Domain Name Server in Iceland offering greater privacy protection, keeping your information confidential and 2 click install for WordPress.
A Web Hosting and Domain Name Server in Iceland specifically designed "for people who are concerned about security and privacy matters." They have one click install for wordpress, accept bitcoin and keep info confidential.
Operating Systems for privacy
A Free Software based on Debian GNU/Linux operating system designed to be used from a DVD or USB stick that allows you to use the Internet anonymously leaving no trace. Used successfully by Snowden to break news to the Guardian about NSA Prism Program.
Ubuntu is a free and open sourceed Debian-based Linux operating system, that is very similar to mac or windows but without the privacy compromises and allowing users to encrypt the home and private directories.
location tracking gps wifi rfid
RFID blocking technologies
Wallets infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft, electronic pickpocketing and location tracking using RFID Chips found in ID's and contactless credit cards.
Passport wallets infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft and location tracking using RFID Chips in passports.
Passport Wallets infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft, electronic pickpocketing and location tracking using RFID Chips found in ID's and contactless credit cards.
Purses infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft, electronic pickpocketing and location tracking using RFID Chips found in ID's and contactless credit cards.
Phone, laptop, tablet cases designed for police forensics with Faraday Caging fabric to block all wireless transmission that could compromise evidence. Now the perfect privacy enhancing tool for shielding spying and location tracking by triangulation Celular, WIFI, Blue Tooth.
social security number
We offer comprehensive consulting and coaching on living with and without the Social Security Number (SSN). See our consulting page for more info.
smart houses and cars
Houses now come with smart meters installed that have the capability of monitoring a large range of information about home owners including when the home is occupied, general number of occupants, sleeping, eating and other data about home life. Cars also have smart technology installed called Event Data Recorder (EDR) aka a "black box" that records information about speed, seatbelt, even audio and video of drivers. Black boxes are installed against consent in all new cars after 2006, and many before and cannot be removed because they are integrated into the air-bag and car computer systems. The data is even used by ome insurance agencies. Tools and resources for helping you regain privacy regarding these, see bellow.
EMF SAFETY NETWORK
Here you can find information on opting out of smart meters on your house as well as a number of other resources.
This is the most comprehensive list of which cars contain Event Data Recorders (EDR). It is comprised by Harris Technical Services, a service provider for accident reconstruction. It may be used to determine if your car has
Look up your states laws and learn when your data can be accessed without your consent and when it cannot.
Cyblok ihas created a cyber lock that can be attached to the cars diagnostic port connector through which the blackbox is generally accessed. This allows users a degree of control over access and measures that can at least require law enforcement to get a court order to access the data thus preventing misuse.
encrypted external drives
Encrypted USB Thumb Drives
Corsair Padlock2 USB 2.0 Flash Drive
- Secure 256-bit hardware AES encryption
- User customizable 4-10 digit personal identification number to lock and unlock
- Built-in hacking detection locks device for 2 minutes after 5 failed attempts... Read more.
Kingston Digital Data Traveler AES Encrypted Vault Privacy 256Bit 3.0 USB Flash Drive (water-proof)
- Business - Grade Security - 100 - percent of stored data is protected by hardware - based, 256 - bit Advanced Encryption Standard (AES) in XTS mode
- USB 3.0 - latest USB standard guarantees backwards compatibility with USB 2.0
- Durable - resilient protection for data in a waterproof 5 aluminum casing... read more.
encrypted external hard drives
Apricorn Aegis Padlock USB 3.0 256-Bit AES XTS Hardware Encrypted Portable External Hard Drive
- Convenient ultra-portable design
- Hardware encrypted drive
- Simple to use PIN Access
- Administrator password feature
- Bus powered
- Integrated USB cable
- Extensive shock mounting
countersuveillance and suosveillance tools
Countersurveillance refers to measures undertaken to prevent surveillance, and countermeasures taken to reduce the risk of surveillance. This includes bug sweeping, the process of detecting surveillance devices, including covert listening devices, and visual surveillance devices. Sousveillance is the recording of an activity by a participant in the activity usually with a portable/wearable camera/audio recorder or even smart phone. The term "sousveillance" was coined by Steve Mann. The word “sur” in French means “over” or “above,” and surveillance the “watching from above." The word “sous,” by contrast, means “under” or “below” and Suosveillance a sort of "watching from below." While government and institutions steadily increase surveillance of individuals, suosveillance tools empower individuals with equal access to digital record and the ability to watch back.