<<<Return to Home

This page contains tools and resources for regaining your privacy on and offline. Browse by category or scroll to view complete directory.


Privacy Tools protect you against global mass surveillance and non-consensual monetization of your personal data.Through cellular, WIFI, Blue Tooth, GPS, electronic financial and other networks, everyday, information about your location, identity, relationships, finances, interests, buying habits, and lifestyle is being mined remotely by both public and private entities. Another name for privacy tools is Privacy Enhancing Technologies (PET's). They consist of communication anonymizers, encrypted data storage tools, and tools for protecting your privacy online and in the real world. Read more by clicking the button bellow.


SELECT A CATEGORY

MASKED ONLINE SHOPPING

MASKED ONLINE SHOPPING

   CALLS AND TEXTS

   CALLS AND TEXTS

  WEBSITE HOSTING

  WEBSITE HOSTING

COUNTERSURVEILLANCE/ SUOSVEILLANCE

COUNTERSURVEILLANCE/ SUOSVEILLANCE

      INTERNET CONNECTION

      INTERNET CONNECTION

   COMPUTER OPERATING SYSTEMS

   COMPUTER OPERATING SYSTEMS

                  CLOUD STORAGE  

                  CLOUD STORAGE

 

              EMAIL & VIDEO CALLING

              EMAIL & VIDEO CALLING

              SEARCH ENGINES

              SEARCH ENGINES

SOCIAL SECURITY NUMBER

SOCIAL SECURITY NUMBER

LOCATION TRACKING GPS WIFI RFID

LOCATION TRACKING GPS WIFI RFID

     SMART HOUSES & CARS

     SMART HOUSES & CARS

USB AND HARD DRIVES

USB AND HARD DRIVES


BROWSE ALL PRIVACY TOOLS & RESOURCES

 

 

PRIVATE CALLING AND TEXT

Open Whisper Systems

Free and open source apps for making encrypted phone calls and text messages.

Silent Circle

An entire communications network based in Switzerland consisting of software, services, and devices built specifically for privacy.


Encrypted Internet Connection

Just putting your browser in "private mode" wont keep your Internet Service Provider and the NSA from spying on you. You need to use a proxy or VPN. Learn more about the IP Address and privacy>>>

IS Your IP Address and location  showing?

Nord VPN

A VPN based in Panama which encrypts your internet connection and masks your IP Address; stopping tracking of your online activity.

Proxy.sh

A VPN based in Seychelles which encrypts your internet connection and masks your IP Address; stopping tracking of your online activity.

Tor Bundle

Tor is a  free and open-source privacy proxy tool that bounces your communications around a distributed network of relays preventing seeing what sites you visit, and your physical location.


Email & VIDEO CALLING

Unseen

An encrypted and overseas email provider based in Iceland which uses an encryption and key exchange not created by the National Institute of Standards in Technology (NIST).

Protonmail

A secure and encrypted email service developed by a group from MIT and CERN based in Switzerland.

Unseen

Unseen has a free video conference calling app that allows anonymous alternative to skype.


anonymous search engines

"...searches reveal a shocking amount of personal information about you, such as your interests, family circumstances, political leanings, medical conditions, and more. This information is modern-day gold for marketers, government officials, black-hat hackers and criminals - all of whom would love to get their hands on your private search data." Dr. Katherine Albrecht

Startpage

An anonymous search engine pulling up Google search results that does not use cookies, record your IP address or save any of your search history.

DuckDuckGo

Another anonymous search engine which again prides itself on no saving search history, using cookies, or recording IP addresses.


ENCRYPTED CLOUD STORAGE

Dropbox or Google Docs are suicide for privacy. There are a number of providers that offer encrypted zero knowledge cloud based storage.

SpiderOak

SpiderOak is a zero knowledge encrypted cloud storage. with up to 2 GB is free and you can share files, sync and do backups of computer and phone.

 

Wuala

A zero knowledge cloud storage based in Switzerland allowing up to 5 GB free and can sync, share, and backup as well.


Finance and ONLINE Purchasing

Abine

A maskingservice for online purchases.They also provide masked email, phone, tracker blocking, password management and internet information removal.

Simon Visa Gift Card

Simon Visa Gift Card is a non reloadable prepaid visa gift card that can be used at all merchants that accept visa. They take up to $500, accept cash, and don’t ask for a name, much less address or SSN. Their malls are everywhere and web interface lets you connect any name and address you want to each card, so you can use them with merchants that do AVS checks which means anonymous online purchases.

Visa Vanilla

Visa Vanilla is a pre-paid credit card that offers anonymity with financial transactions and can be purchased cash requiring no personal identifying information from most corner stores, drug stores and grocery stores in the US. It can be used with almost all merchants where visa is accepted but require registration online through their website to use in online transactions. Can be loaded in amounts between (20 500 dollars). Tip: Pay for gas inside or it will automatically charge $75 to your card. They also cannot be reloaded.

Sovereign Gold Card

Sovereign Gold card offers offshore bank accounts for individuals and business accounts with private debit cards and anonymous prepaid debit cards. Their partner company helps set up foreign corporations.


Private Web Hosting

Unseen

A Webhost and Domain Name Server in Iceland offering greater privacy protection, keeping your information confidential and 2 click install for WordPress.

 

Orange Website

A Web Hosting and Domain Name Server in Iceland specifically designed  "for people who are concerned about security and privacy matters." They have one click install for wordpress, accept bitcoin and keep info confidential.


Operating Systems for privacy

Tails

  A Free Software based on Debian GNU/Linux operating system designed to be used from a DVD or USB stick that allows you to use the Internet anonymously leaving no trace. Used successfully by Snowden to break news to the Guardian about NSA Prism Program.

 

Ubuntu

Ubuntu is a free and open sourceed Debian-based Linux operating system, that is very similar to mac or windows but without the privacy compromises and allowing users to encrypt the home and private directories.


location tracking gps wifi rfid

RFID blocking technologies

 
 
 

Wallets infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft, electronic pickpocketing and location tracking using RFID Chips found in ID's and contactless credit cards.

 

Passport wallets infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft and location tracking using RFID Chips in passports.

 

 

Passport Wallets infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft, electronic pickpocketing and location tracking using RFID Chips found in ID's and contactless credit cards.

 

 

 

 

Purses infused with Faraday Caging fabric effectively blocking wireless transmission and shielding identity theft, electronic pickpocketing and location tracking using RFID Chips found in ID's and contactless credit cards.

 

 

 

 

Phone, laptop, tablet cases designed for police forensics  with Faraday Caging fabric to block all wireless transmission that could compromise evidence. Now the perfect privacy enhancing tool for shielding spying and location tracking by triangulation Celular, WIFI, Blue Tooth.


social security number

Frontier liberty

We offer comprehensive consulting and coaching on living with and without the Social Security Number (SSN). See our consulting page for more info.


smart houses and cars

Houses now come with smart meters installed that have the capability of monitoring a large range of information about home owners including when the home is occupied, general number of occupants, sleeping, eating and other data about home life. Cars also have smart technology installed called Event Data Recorder (EDR) aka a "black box" that records information about speed, seatbelt, even audio and video of drivers. Black boxes are installed against consent in all new cars after 2006, and many before and cannot be removed because they are integrated into the air-bag and car computer systems. The data is even used by ome insurance agencies. Tools and resources for helping you regain privacy regarding these, see bellow.

Smart Home

EMF SAFETY NETWORK

Here you can find information on opting out of smart meters on your house as well as a number of other resources.

Smart Car

List of states and their legislation regarding car black boxes and privacy

Look up your states laws and learn when your data can be accessed without your consent and when it cannot.

cyblok

Cyblok ihas created a cyber lock that can be attached to the cars diagnostic port connector through which the blackbox is generally accessed. This allows users a degree of control over access and measures that can at least require law enforcement to get a court order to access the data thus preventing misuse.


encrypted external drives

Encrypted USB Thumb Drives

Corsair Padlock2 USB 2.0 Flash Drive

  • Secure 256-bit hardware AES encryption
  • User customizable 4-10 digit personal identification number to lock and unlock
  • Built-in hacking detection locks device for 2 minutes after 5 failed attempts... Read more.

Kingston Digital Data Traveler AES Encrypted Vault Privacy 256Bit 3.0 USB Flash Drive (water-proof)

  • Business - Grade Security - 100 - percent of stored data is protected by hardware - based, 256 - bit Advanced Encryption Standard (AES) in XTS mode
  • USB 3.0 - latest USB standard guarantees backwards compatibility with USB 2.0
  • Durable - resilient protection for data in a waterproof 5 aluminum casing... read more.

encrypted external hard drives

Apricorn Aegis Padlock USB 3.0 256-Bit AES XTS Hardware Encrypted Portable External Hard Drive

  • Convenient ultra-portable design
  • Hardware encrypted drive
  • Simple to use PIN Access
  • Administrator password feature
  • Bus powered
  • Integrated USB cable
  • Extensive shock mounting

countersuveillance and suosveillance tools

Countersurveillance refers to measures undertaken to prevent surveillance, and countermeasures taken to reduce the risk of surveillance. This includes bug sweeping, the process of detecting surveillance devices, including covert listening devices, and visual surveillance devices. Sousveillance is the recording of an activity by a participant in the activity usually with a portable/wearable camera/audio recorder or even smart phone. The term "sousveillance" was coined by Steve Mann.  The word “sur” in French means “over” or “above,” and surveillance the “watching from above." The word “sous,” by contrast, means “under” or “below” and Suosveillance a sort of "watching from below." While government and institutions steadily increase surveillance of individuals, suosveillance tools empower individuals with equal access to digital record and the ability to watch back.