Privacy Guides: The Expert's Guide to Online Privacy in 2023 https://www.privacytools.io/guides/ Protect your digital footprint with the expert's guide to online privacy. Our comprehensive guides cover everything you need to know to stay safe online. Tue, 25 Jul 2023 09:46:45 +0700 How to add a custom domain on Skiff for free https://www.privacytools.io/guides/free-custom-domain-skiff <p>If you’re looking for the <a href="https://www.privacytools.io/privacy-email">most private email provider</a>, adding a custom domain should be a key part of your checklist. Domains enhance your privacy with greater ownership, portability, and aliasing to make sure you stay secure in all email communications. Tue, 25 Jul 2023 09:07:24 +0700 2b210021170ff94acb4e232d34a8c0e2 Internxt Unveiled: Safeguarding Your Encrypted Files and Photo Memories https://www.privacytools.io/guides/internxt-encrypted-files-and-photos <p>Let me introduce you to Internxt, a great alternative to Google Drive, Dropbox, WeTransfer and Google Photos. Thu, 22 Jun 2023 12:25:48 +0700 69c32123d3276bb60b5dfa1ba8bb613e Skiff: Gmail & Workspace Alternative with Encrypted and Decentralized IPFS Storage https://www.privacytools.io/guides/skiff-decentralized-ipfs-storage <p>If you're looking for a Gmail or Google Workspace alternative, then <a href="https://skiff.com/" target="_blank" rel="noopener">Skiff products</a> might catch your interest. Tue, 06 Jun 2023 09:35:11 +0700 58987e6e928b80074b978b38b82acdf5 Phone and Laptop Seizures at Airports and Borders - Privacy Travel Guide https://www.privacytools.io/guides/phone-and-laptop-seizures-at-airports-and-borders <p>The world and its borders are slowly opening up after strict Covid lockdowns, and people are looking forward to travelling again. While this is great and fun, keep in mind that you might be subject to random searches and highly invasive and traumatic experiences. Sun, 01 Jan 2023 16:58:00 +0700 d46130f4b9c932f674d11c03885642f2 Android: Simple, open-source apps without ads, tracking and unnecessary permissions https://www.privacytools.io/guides/android-simple-open-source-apps-without-ads-tracking <p>I want to introduce you to a great Android developer team that released countless alternatives to apps that usually come for free but invade your privacy. Thu, 08 Dec 2022 10:57:18 +0700 956da46473a842e64c454e810eb1008c Exodus for Android: Finds trackers embedded in all your apps https://www.privacytools.io/guides/exodus-for-android-finds-trackers <p>Today, I want to shed light on a fairly unknown but powerful Android app that helps you to locate trackers embedded in all your smartphone apps. Thu, 01 Dec 2022 15:35:40 +0700 9db099d1786fa7fe643499148ddee82c 7 Publicly Known LastPass Security Breaches since 2011 https://www.privacytools.io/guides/7-publicly-known-lastpass-security-breaches-since-2011 <p>The security team of the popular password manager LastPass can't seem to catch a break. This is the second security breach this year, and they are connected. Thu, 01 Dec 2022 12:01:47 +0700 dd71c2977cbc0481ed59868f96e6222a AirDrop feature limited ahead of protests in China https://www.privacytools.io/guides/airdrop-feature-limited-ahead-of-protests-in-china <p>Apple Inc. has limited the AirDrop wireless file-sharing feature on iPhones in China after the mechanism was used by protesters to spread images to other iPhone owners. AirDrop allows the quick exchange of files like images, documents, or videos between Apple devices. Wed, 30 Nov 2022 16:20:37 +0700 ce63a22f67b6272ef50c6e1a35013dab The Eufy Security Camera Privacy Scandal: Unencrypted Cloud Footage https://www.privacytools.io/guides/eufy-security-camera-privacy-scandal <p>Twitter user Paul Moore discovered recently that his Eufy home security camera leaks unencrypted private images of faces and names to the cloud, even with cloud storage disabled. Wed, 30 Nov 2022 12:06:20 +0700 1a73fbf8947d69ff1b2cc5536b863550 Encrypted Twitter DMs soon for improved privacy with Signal Protocol https://www.privacytools.io/guides/encrypted-twitter-privacy <p>Twitter is working on end-to-end encrypted Twitter DMs under the new leadership of Elon Musk. Mon, 28 Nov 2022 12:26:21 +0700 48b8aebbd9841616b5d02d0806eee894 Berty Messenger: Private, secure, distributed. Even works offline! https://www.privacytools.io/guides/berty-messenger <p>You might wonder why you should be interested in another instant messenger app? Berty comes with heaps of neat feature, is packed in an appealing and modern design. It's secure but at the same time easy-to-use. It could be something your friends <strong>actually</strong> going to use. Wed, 26 Oct 2022 09:44:09 +0700 aff8a486627aac48d2dad50a9899d3cc Data Breach Prevention to Protect Your Privacy https://www.privacytools.io/guides/data-breach-prevention-to-protect-your-privacy <p>Data breaches in a nutshell: Data breaches happen every day. It has become more important than ever to understand what a data breach is, how it happens, and how we, as users, can prevent it. Mon, 17 Oct 2022 10:13:10 +0700 39c257b29d07aa77b3010a97737719b2 Is the Five Eyes Alliance a Threat to Your Privacy? https://www.privacytools.io/guides/five-eyes-alliance-threat-to-privacy <p>The Five Eyes is an international intelligence-sharing alliance. The Five Eyes countries are Canada, Australia, New Zealand, the United Kingdom, and the United States. Sat, 15 Oct 2022 11:10:06 +0700 724068b3cc5e1693b80a76b41d91650b WireGuard vs. OpenVPN: Which VPN protocol is better? https://www.privacytools.io/guides/wireguard-vs-openvpn <p>When you connect to a VPN, your data travels through a secure encrypted tunnel to a VPN server, where you’re assigned an IP address. A VPN protocol refers to the rules and instructions determining how the encrypted tunnel is formed. Fri, 23 Sep 2022 10:17:50 +0700 e43874fbd4c2162881ffefb12fc5baf0 Proxy vs. VPN: Which One Should You Choose? https://www.privacytools.io/guides/proxy-vs-vpn <p>Virtual private networks (VPN) and proxy servers are both great tools for protecting your identity online. People tend to think of them as doing the same thing.</p> <p> Wed, 21 Sep 2022 19:04:39 +0700 01e3df1d03397384ea4e0d38f0864e3c Sentinel dVPN Guide: New, Exciting and Decentralized. Everything Explained https://www.privacytools.io/guides/sentinel-dvpn <p>A <a href="https://www.privacytools.io/dvpn">decentralized VPN (dVPN)</a>, like a more traditional <a href="https://www.privacytools.io/privacy-vpn">centralized VPN (cVPN)</a>, hides your IP address, encrypts your data, changes your digital geolocation, and allows you to be safer when browsing the internet. Wed, 21 Sep 2022 08:35:08 +0700 0aa980cd88010e55580ee45e05b5ab4a VPN vs Tor: Which one is right for you? https://www.privacytools.io/guides/vpn-vs-tor <p>Online security and privacy are becoming increasingly important. Therefore, it isn’t surprising to see many people turning to internet security tools for more online protection. Fri, 09 Sep 2022 21:20:06 +0700 023b42235cdc8c2296230668c20deafe Privacy, Cybersecurity and Anonymity - Difference Explained https://www.privacytools.io/guides/privacy-cybersecurity-anonymity-difference <p>Privacy, cybersecurity and anonymity are all different concepts that are often used interchangeably. Understanding the difference between these three is crucial to understanding how they work together to protect your identity online. Thu, 25 Aug 2022 00:08:22 +0700 effa4b402383d3f5358224787800f56b Grammarly Alternative: LanguageTool an open-source grammar and spell checker https://www.privacytools.io/guides/grammarly-alternative-languagetool <p>Grammarly is a popular proofreader who helped millions of people around the world to gain confidence in writing. In this post, you'll learn about an even better open-source Grammarly alternative, called LanguageTool. Sat, 20 Aug 2022 16:27:15 +0700 8bb3d687ef53cd2b53f344947d8c077c Top 10: Privacy Tools List with Out-of-the-Box Solutions https://www.privacytools.io/guides/top-10-privacy-tools <p>In this list, we're introducing you to ten great privacy tools that come with out-of-the-box privacy features that don't require complicated setup or configuration procedures. Ideal for beginners or when setup time is a crucial factor.</p> <p> Sat, 20 Aug 2022 12:59:36 +0700 bc5c898116699013ddca44301d753004 How to access reddit without ads and tracking while benefiting from faster page load times https://www.privacytools.io/guides/how-to-access-reddit-without-ads-tracking <p>Reddit ranks in the top 10 of most visited website in the world. Part of their business model is serving ads to their users and gain data with tracking. Nonetheless redditors all over the world appreciate and love the website for it's user submitted content. Sat, 13 Aug 2022 19:44:01 +0700 84737f0f348998f141d828fdcd6ba029 Enforce Privacy & Security Best-Practices on Windows and macOS: privacy.sexy https://www.privacytools.io/guides/enforce-privacy-security-on-windows-and-macos <p>Today we present you another <strong>GitHub Gem:</strong> privacy.sexy is an open-source privacy tool to enforce security and privacy best-practices on Windows and macOS.</p> <p> Tue, 05 Apr 2022 17:32:28 +0700 ee99d40bc36294adc0e9324c8213759a Jonah Aragon's (PrivacyGuides) Failed Attempt to Takeover PrivacyTools.io https://www.privacytools.io/guides/jonah-aragon-privacyguides-failed-attempt-to-takeover <p>This long overdue blog post covers the failed takeover attempt of this website, cryptocurrency donations theft, a successful smear campaign, corruption and censorship. All initiated, fabricated by <strong>Jonah Aragon</strong>, the project lead of PrivacyGuides.org and <strong>Aragon Ventures LLC</strong>. Fri, 01 Apr 2022 22:35:09 +0700 8c73706ea750cfa33f14b0919a5aa7c7 Introduction of GitHub 💎 Gems by PrivacyTools.io https://www.privacytools.io/guides/introduction-of-github-gems <p dir="auto">What are GitHub Gems by <a href="https://www.privacytools.io/" rel="nofollow">PrivacyTools.io</a>? Wed, 30 Mar 2022 17:35:16 +0700 5c0a8d67bcafad8f6a35f4f207e77425 Open Source Portfolio Managers and Trackers for Wealth Management https://www.privacytools.io/guides/open-source-portfolio-manager-privacy <p>Today we present you two <strong>GitHub Gems</strong>: Portfolio Tracker, Wealth Management, Accounting and Analytics Tools that protect your privacy. Supports stocks, EFTs and crypto currencies. Both tools are respecting your privacy. Wed, 30 Mar 2022 14:26:46 +0700 bdf21e53f3be72bac74f51c045fb6a4b Whistleblower Guide: How Privacy Tools Can Protect You From Retaliation https://www.privacytools.io/guides/whistleblower-guide <p>Picture this: You’re in a position where you want to expose wrongdoing but you’re afraid of retaliation. Whether it’s a company or a government, someone is putting lives, the environment, or society at risk with their actions. Tue, 29 Mar 2022 09:10:33 +0700 3a43313bad6eca106cfecad14c7c70b4 8 Simple Stupid Flat File CMS: Free, User-Friendly and Open Source https://www.privacytools.io/guides/8-simple-stupid-flat-file-cms-free-user-friendly-and-open-source <p>You've decided to start your own website or blog and don't know where to start? Mon, 28 Mar 2022 20:01:35 +0700 40d4ee146ac628ceddf4e018586eff3b Manufacturer Tools for Wiping HDD and SSD Drives https://www.privacytools.io/guides/manufacturer-tools-for-wiping-hdd-and-ssd-drives <p id="appendix-j-manufacturer-tools-for-wiping-hdd-and-ssd-drives">Always check your laptop BIOS/UEFI for native utilities first. Mon, 28 Mar 2022 11:14:04 +0700 49137a12accc8ddfa2ce40c9e4fc3a03 Emergency Preparedness: A Plan for Worst Case Scenarios https://www.privacytools.io/guides/emergency-preparedness-a-plan-for-worst-case-scenarios <p dir="auto">If we were to place security, privacy, and anonymity onto a sliding scale from 1-100, nobody is going to be able to achieve all 100s. Mon, 28 Mar 2022 10:39:16 +0700 bea7fe09624aa594c20d4d72ae6a271e File-Change Detection or Integrity Monitoring Systems https://www.privacytools.io/guides/file-change-detection-or-integrity-monitoring-systems <p>Pretty much the only thing left to do is to make sure that our data is not being changed or altered without our prior knowledge or consent. Mon, 28 Mar 2022 10:34:31 +0700 2238587dd7e7424ecdbc17fcce0c71eb Acceptable Places to Communicate Securely with Another Party https://www.privacytools.io/guides/acceptable-places-to-communicate-securely-with-another-party <p dir="auto">You might never think of physical security coming into play too much if you have a very high level of Internet/Device security. Mon, 28 Mar 2022 10:29:48 +0700 85cfcef6c6a002f86410ffcb76cde22e Advanced Encryption Chapter https://www.privacytools.io/guides/advanced-encryption-chapter <p dir="auto">I know, I have already discussed different areas of encryption in varying levels of detail. But I think an aspect that needs to be highlighted even further is a point I made shortly above. Mon, 28 Mar 2022 10:23:10 +0700 4029bb42f5f366b23c0972b983b355d1 Advanced Password Management and Storage https://www.privacytools.io/guides/advanced-password-management-and-storage <p>In the beginning sections of this paper, I talked a bit about creating strong passwords and how to store them securely. Mon, 28 Mar 2022 10:18:01 +0700 d16a227074f923effb028cb2d23e2311 Using Virtual Private Networks (VPN) and Tor Together https://www.privacytools.io/guides/using-virtual-private-networks-vpn-and-tor-together <p dir="auto">The issue once you get to need such a level of security that you find yourself categorized in a paper like this is you are really the only person who knows what you need to keep yourself safe. Mon, 28 Mar 2022 10:13:13 +0700 3fc1cbc264fb653253b4bada619c7d57 The Issues with Free and Open-Source Software for Privacy Tools https://www.privacytools.io/guides/the-issues-with-free-and-open-source-software-for-privacy-tools <p dir="auto">Once you get down to this level, you almost need to reevaluate everything about your threat model and what you are doing to protect yourself. Mon, 28 Mar 2022 10:05:30 +0700 891f12dd65400caf8efec4c92aff7850 Secure Operating Systems: Tails, Debian and Qubes OS https://www.privacytools.io/guides/secure-operating-systems <p>Before we dive to heavily into the tactics that are going to keep an individual at this level secure from a big name adversary, we have to consider the operating systems that we are doing our work on, communicating through, and using to send people information. Sun, 27 Mar 2022 21:57:56 +0700 cb04c5b3143c58ca109bde7a39d28dbe Deleting and Decluttering Data to Improve Privacy https://www.privacytools.io/guides/deleting-and-decluttering-data-to-improve-privacy <p>After you have put all of the above pages to good use, you are going to be left with a lot of unneeded data. Sun, 27 Mar 2022 21:53:28 +0700 c20bb9f1d323a324007d7b86d893b213 Anonymity and the Challange of Payment Methods https://www.privacytools.io/guides/anonymity-and-the-challange-of-payment-methods <p>The issue with anonymity is that it is fairly easy to acquire online until you have to pay for something. Sun, 27 Mar 2022 21:46:50 +0700 0359b5c03b82c25a900418c21af724bb What is Metadata and how can it hurt your Privacy? https://www.privacytools.io/guides/what-is-metadata-and-how-can-it-hurt-your-privacy <p>Metadata is data that describes other data. Sun, 27 Mar 2022 21:43:16 +0700 597e963b333b87f7c20fd1765aad8e27 Cell Phones are not Devices that Aid in Being Anonymous https://www.privacytools.io/guides/cell-phones-are-not-devices-that-aid-in-being-anonymous <p>It isn’t so obvious why after we discussed earlier about the strong encryption on a newer iPhone, they might not be considered a tool for anonymity but it is true. Cell phones are not devices that aid in you being anonymous. Sun, 27 Mar 2022 21:38:11 +0700 54cf58656634b13fc01f7e6739a38d3e Keeping Personal Information Out and Using an Alias to Hide Your Real Identity https://www.privacytools.io/guides/keeping-personal-information-out-and-using-an-alias-to-hide-your-real-identity <p dir="auto">If you are reading this but have no need for anonymity and really can’t see where it would fit into your Internet life, I at least hope you can imagine a situation where someone else might need it. Sun, 27 Mar 2022 21:31:43 +0700 45b92241bbed7f810c5e514bc37346ed Gaining Anonymity: The Tor Network & Tor Browser Bundle https://www.privacytools.io/guides/gaining-anonymity-the-tor-network-tor-browser-bundle <p>My first step in looking at anonymity is making use of the TBB and the Tor network. Tor was released in 2002 and has since evolved into a tool that is used by millions of people worldwide. Sun, 27 Mar 2022 21:24:46 +0700 bea70639fab77e0211b3dc4a2a4d5640 GPG/PGP Based Encryption & Authentication for Emails https://www.privacytools.io/guides/gpg-pgp-based-encryption-authentication-for-emails <p dir="auto">One of the other things you will have likely noticed me touching on is companies who are willing to share their PGP Key for customers so they can use email + PGP for communication to support. Sun, 27 Mar 2022 21:16:45 +0700 554f55e2fe48f946af3e65fa9c971dd8 The Importance of Free and Open-Source Software for Privacy Tools https://www.privacytools.io/guides/the-importance-of-free-and-open-source-software-for-privacy-tools <p>Getting back to the good stuff, I have talked in the above pages about a term called FOSS or open source, or the long form Free, Open Source Software. Sun, 27 Mar 2022 21:11:04 +0700 242d5e7e6ea07299119adfd9785cf2ba Breaking Down a Privacy Service: What's Really Under the Rug? https://www.privacytools.io/guides/breaking-down-a-privacy-service-what-s-really-under-the-rug <p>By now, the hope is that you have really begun to look at the services you are using on a day-to-day basis. Sun, 27 Mar 2022 21:03:09 +0700 0d81ff3851e50218784e76b11b33bdf5 How is the Five Eyes Intelligence Alliance Related to Your Privacy? https://www.privacytools.io/guides/how-is-the-five-eyes-intelligence-alliance-related-to-your-privacy <p dir="auto">The “5 Eyes” countries refer to 5 countries (United States, Canada, The United Kingdom, Australia, and New Zealand) that have an intelligence agreement known as the <a href="https://en.wikipedia.org/wiki/UKUSA_Agreement" target="_blank" rel="noopener">UKUSA Agreement</a> to share information with one another. Sun, 27 Mar 2022 20:54:54 +0700 28485da5057ab49c30ef0fdfdb7ab366 A Guide for Firewalling Your Network Connections: Windows, MacOS and Linux https://www.privacytools.io/guides/a-guide-for-firewalling-your-network-connections-windows-macos-and-linux <p>One of the other ways one can secure their connection to the Internet is to make sure that all incoming and outgoing connections are being passed through a Firewall. Sun, 27 Mar 2022 16:59:05 +0700 3395ce9ad492e591f44145ff907b67bc A Complete Guide to Virtual Private Networks (VPNs) https://www.privacytools.io/guides/a-complete-guide-to-virtual-private-networks-vpns <p>There are very few locations where I actually trust connecting directly to the Internet. Sun, 27 Mar 2022 16:46:52 +0700 e0e7e67d83b3332bd141e2d67d026ab6 Full Disk Encryption: Strongest Counter to Surveillance, Attack and Theft of Your Devices https://www.privacytools.io/guides/full-disk-encryption-strongest-counter-to-surveillance-attack-and-theft-of-your-devices <p>One of your strongest counters to surveillance, attack, and theft of your devices is making sure the data on them is secure. Sun, 27 Mar 2022 16:36:13 +0700 78fbda2519815acc015e446a49cbb085 Securing Online Accounts: Always use Two-Factor Authentication https://www.privacytools.io/guides/securing-online-accounts-always-use-two-factor-authentication <p>Hopefully by now you have registered for a ProtonMail or Tutanota account and are ready to start transferring some accounts over. Sun, 27 Mar 2022 16:30:17 +0700 223ae80c5dfbf0255f96b0b8d4fbe1b8 Storing & Sharing in the Cloud: Finding the Right Provider to Protect Your Privacy https://www.privacytools.io/guides/storing-sharing-in-the-cloud-finding-the-right-provider-to-protect-your-privacy <p dir="auto">Right alongside messaging people in a secure manner, we have to think about how and where we are storing files in the cloud, and how those files are being shared with others. Sun, 27 Mar 2022 16:25:07 +0700 f88fbb29f5c264366d9e7b43dcf44c90 Apple's iMessage Service and Privacy https://www.privacytools.io/guides/apple-s-imessage-service-and-privacy <p>Apple has provided a messaging service since the dawn of the iPhone many years ago and expanded on it to be a very privacy conscious and secure way of communicating. Sun, 27 Mar 2022 16:18:16 +0700 1d1a649fd8b1076123202d71b8f4fa14 Messaging with Signal by Open Whisper Systems https://www.privacytools.io/guides/messaging-with-signal-by-open-whisper-systems <p dir="auto">Signal is marketed on the Open Whisper Systems website as “Privacy that fits in your pocket”. Sun, 27 Mar 2022 16:11:56 +0700 5e07bd5478380e51e855f5e982fd9a8e Messaging privately and securely with the XMPP/Jabber Protocol https://www.privacytools.io/guides/messaging-privately-and-securely-with-the-xmpp-jabber-protocol <p>The one thing missing from Version 2 of the paper was the XMPP/Jabber Protocol and OTR (off-the-record) for messaging privately and securely. Sun, 27 Mar 2022 16:04:22 +0700 614181863233aa9a1b1a7e9af8b3c9ea Daily go-to Secure Messaging Apps for Better Privacy https://www.privacytools.io/guides/daily-go-to-secure-messaging-apps <p><strong>Warning:</strong> This section of <a href="https://www.privacytools.io/guides/the-crypto-paper">The Crypto Paper</a> is <span style="color: #e03e2d;">outdated</span>. Wire went through some severe Privacy policy changes: Sun, 27 Mar 2022 15:54:19 +0700 6fd979bebb16db30d8c900d62aa83ad4 Secure Email in Switzerland: ProtonMail https://www.privacytools.io/guides/secure-email-in-switzerland-protonmail <p dir="auto">Before coming across the ProtonMail crowdfunding campaign, I was an avid user of email services like Yahoo and Gmail. Sun, 27 Mar 2022 15:41:39 +0700 03c138c76ceb8e2317538e2a5780f9b9 Privacy Tools: Securely Transmitting Information - Messaging & Calling https://www.privacytools.io/guides/privacy-tools-securely-transmitting-information-messaging-calling <p>Currently, technology allows us to communicate in so many different ways with each other that even 30 years ago we were unable to do. Sun, 27 Mar 2022 15:34:27 +0700 235ffcbb1cd5cf714b0a47cb35a5432d A Starting Place for Business and Tech Geeks https://www.privacytools.io/guides/a-starting-place-for-business-and-tech-geeks <p>I often times see people whom are clearly business people doing business related things with customers, clients, and the like in very public places in very insecure manors. Sun, 27 Mar 2022 15:20:23 +0700 2c11b60570609df04bf5ad053453a35c Once it is out on the Internet, it's impossible to take it back or erase for good https://www.privacytools.io/guides/once-it-is-out-on-the-internet-it-s-impossible-to-take-it-back-or-erase-for-good <p dir="auto">So once you have the basics of how the Internet can work with you to keep you safe, it is vital that you determine what information you are putting out there, where it is going, and who is able to view it. Sun, 27 Mar 2022 15:13:38 +0700 f5e3c2f7302016c3fd5c3e87f33f6fd4 Hashing & Authentication: How are your passwords stored on websites? https://www.privacytools.io/guides/hashing-authentication-how-are-your-passwords-stored-on-websites <p dir="auto">It is important when we learn about encryption and using it alongside strong passwords, to also take a look at how these passwords are stored on the website’s server. Sun, 27 Mar 2022 15:08:52 +0700 0e583fa5f7b0239909baf9e73d4b6f5f Choosing and Using Strong Passwords and Manage them easily https://www.privacytools.io/guides/choosing-and-using-strong-passwords-and-manage-them-easily <p>Now, there is a difference between some terminologies here that seems to be used interchangeably when they aren’t really the same. Sun, 27 Mar 2022 15:00:38 +0700 ce036276af3d26241dbeb51aed867e96 How does HTTPS / Browser Encryption work? https://www.privacytools.io/guides/how-does-https-browser-encryption-work <p>Often times when you connect to a website, you will notice that the URL just displays the website name. But as we move into a more digital world, it is highly recommended that sites use SSL Certificates and Transport Layer Security to encrypt your connection to them. Sun, 27 Mar 2022 14:55:29 +0700 d07e955d1c7711311673441b02764457 Your first choice for better internet privacy: Firefox Browser https://www.privacytools.io/guides/web-browser-for-better-internet-privacy-firefox <p>Diving right into the specifics, I want to start off with the most common mode of accessing the World Wide Web, your Internet browser. Sun, 27 Mar 2022 14:44:35 +0700 ff8237f530a7de101cb899316a36f49d Your primary tool to keep data secure: Encryption https://www.privacytools.io/guides/your-primary-tool-to-keep-data-secure-encryption <p>I am a pretty big believer in encryption online because encryption can be seen as the primary tool that keeps our information/data secure. Sun, 27 Mar 2022 14:35:12 +0700 fa7ff743d3e2468f7506db7ceb0dc227 Defining Your Threat-Model https://www.privacytools.io/guides/defining-your-threat-model <p>For starters, a threat-model could be defined as how an individual needs to be protected based on things like:</p> <ul> <li> Sun, 27 Mar 2022 14:26:58 +0700 b6a2273a454a8f2cec1a37ee4302fe39 The difference between Privacy, Security and Anonymity explained https://www.privacytools.io/guides/the-difference-between-privacy-security-and-anonymity-explained <p dir="auto"><strong>What is Privacy? </strong>Wikipedia describes privacy as “the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively” and I would largely agree that the definition provided fits the mold. Sun, 27 Mar 2022 14:19:20 +0700 ba34a65a778c565870577f53c6d5433d The Crypto Paper https://www.privacytools.io/guides/the-crypto-paper <p>Written by @CryptoSeb and taken offline recently. Archived, updated and web-friendly now on <strong>Privacy Guides</strong> by <a href="https://www.privacytools.io/">PrivacyTools.io</a>.</p> <h2>Table of Contents</h2> <p>The paper covers four different threat models:</p> <ul dir="auto"> <li><strong><span style="color: #3598db;">1st Threat-Model: Common Internet Users</span></strong> <ul dir="auto"> <li><a href="https://www.privacytools.io/guides/the-difference-between-privacy-security-and-anonymity-explained"><strong><span style="color: #3598db;">The difference between Privacy, Security and Anonymity</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/defining-your-threat-model"><strong><span style="color: #3598db;">Defining Your Threat-Model</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/your-primary-tool-to-keep-data-secure-encryption"><strong><span style="color: #3598db;">Your primary tool to keep data secure: Encryption</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/web-browser-for-better-internet-privacy-firefox"><strong><span style="color: #3598db;">Your first choice for better internet privacy: Firefox Browser</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/how-does-https-browser-encryption-work"><strong><span style="color: #3598db;">How does HTTPS / Browser Encryption work?</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/choosing-and-using-strong-passwords-and-manage-them-easily"><strong><span style="color: #3598db;">Choosing and Using Strong Passwords and Manage them easily</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/hashing-authentication-how-are-your-passwords-stored-on-websites"><strong><span style="color: #3598db;">Hashing &amp; Authentication: How are your passwords stored on websites?</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/once-it-is-out-on-the-internet-it-s-impossible-to-take-it-back-or-erase-for-good"><strong><span style="color: #3598db;">Once it is out on the Internet, it's impossible to take it back or erase for good</span></strong></a></li> </ul> </li> </ul> <ul dir="auto"> <li><strong><span style="color: #169179;">2nd Threat-Model: Tech Geeks</span></strong><strong><span style="color: #169179;"></span></strong> <ul dir="auto"> <li><a href="https://www.privacytools.io/guides/a-starting-place-for-business-and-tech-geeks"><strong><span style="color: #169179;">A Starting Place for Business and Tech Geeks</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/privacy-tools-securely-transmitting-information-messaging-calling"><strong><span style="color: #169179;">Securely Transmitting Information - Messaging &amp; Calling</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/secure-email-in-switzerland-protonmail"><strong><span style="color: #169179;">Secure Email in Switzerland: ProtonMail</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/daily-go-to-secure-messaging-apps"><strong><span style="color: #169179;">Daily go-to Secure Messaging Apps for Better Privacy</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/messaging-privately-and-securely-with-the-xmpp-jabber-protocol"><strong><span style="color: #169179;">Messaging privately and securely with the XMPP/Jabber Protocol</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/messaging-with-signal-by-open-whisper-systems"><strong><span style="color: #169179;">Messaging with Signal by Open Whisper Systems</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/apple-s-imessage-service-and-privacy"><strong><span style="color: #169179;">Apple's iMessage Service and Privacy</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/storing-sharing-in-the-cloud-finding-the-right-provider-to-protect-your-privacy"><strong><span style="color: #169179;">Storing &amp; Sharing in the Cloud: Finding the Right Provider to Protect Your Privacy</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/securing-online-accounts-always-use-two-factor-authentication"><strong><span style="color: #169179;">Securing Online Accounts: Always use Two-Factor Authentication</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/full-disk-encryption-strongest-counter-to-surveillance-attack-and-theft-of-your-devices"><strong><span style="color: #169179;">Full Disk Encryption: Strongest Counter to Surveillance, Attack and Theft of Your Devices</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/a-complete-guide-to-virtual-private-networks-vpns"><strong><span style="color: #169179;">A Complete Guide to Virtual Private Networks (VPNs)</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/a-guide-for-firewalling-your-network-connections-windows-macos-and-linux"><strong><span style="color: #169179;">Firewalling Your Network Connections: Windows, MacOS and Linux</span></strong></a></li> </ul> </li> </ul> <ul dir="auto"> <li><strong><span style="color: #e67e23;">3rd Threat-Model: Investigative Journalists, Government Members, CEOs<br></span></strong> <ul dir="auto"> <li><a href="https://www.privacytools.io/guides/how-is-the-five-eyes-intelligence-alliance-related-to-your-privacy"><strong><span style="color: #e67e23;">How is the Five Eyes Intelligence Alliance Related to Your Privacy?</span></strong></a><strong><span style="color: #e67e23;"></span></strong><strong><span style="color: #e67e23;"></span></strong><strong></strong></li> <li><a href="https://www.privacytools.io/guides/breaking-down-a-privacy-service-what-s-really-under-the-rug" target="_blank" rel="noopener"><strong><span style="color: #e67e23;">Breaking Down a Privacy Service: What's Really Under the Rug?</span></strong></a><strong><span style="color: #e67e23;"></span></strong></li> <li><a href="https://www.privacytools.io/guides/the-importance-of-free-and-open-source-software-for-privacy-tools"><strong><span style="color: #e67e23;">The Importance of Free and Open-Source Software for Privacy Tools</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/gpg-pgp-based-encryption-authentication-for-emails"><strong><span style="color: #e67e23;">GPG/PGP Based Encryption &amp; Authentication for Emails</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/gaining-anonymity-the-tor-network-tor-browser-bundle"><strong><span style="color: #e67e23;">Gaining Anonymity: The Tor Network &amp; Tor Browser Bundle</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/keeping-personal-information-out-and-using-an-alias-to-hide-your-real-identity"><strong><span style="color: #e67e23;">Keeping Personal Information Out and Using an Alias to Hide Your Real Identity</span></strong><strong><span style="color: #e67e23;"></span></strong></a></li> <li><a href="https://www.privacytools.io/guides/cell-phones-are-not-devices-that-aid-in-being-anonymous"><strong><span style="color: #e67e23;">Cell Phones are not Devices that Aid in Being Anonymous</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/what-is-metadata-and-how-can-it-hurt-your-privacy"><strong><span style="color: #e67e23;">What is Metadata and how can it hurt your Privacy?</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/anonymity-and-the-challange-of-payment-methods"><strong><span style="color: #e67e23;">Anonymity and the Challange of Payment Methods</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/deleting-and-decluttering-data-to-improve-privacy"><strong><span style="color: #e67e23;">Deleting and Decluttering Data to Improve Privacy</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/secure-operating-systems"><strong><span style="color: #e67e23;">Secure Operating Systems: Tails, Debian and Qubes OS</span></strong></a></li> </ul> </li> </ul> <ul dir="auto"> <li><strong><span style="color: #e03e2d;">4th Threat-Model: Whistleblowers and Investigative Journalists Under Threat<br></span></strong> <ul dir="auto"> <li><a href="https://www.privacytools.io/guides/the-issues-with-free-and-open-source-software-for-privacy-tools"><strong><span style="color: #e03e2d;">The Issues with Free and Open-Source Software for Privacy Tools</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/using-virtual-private-networks-vpn-and-tor-together"><strong><span style="color: #e03e2d;">Using Virtual Private Networks (VPN) and Tor Together</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/advanced-password-management-and-storage"><strong><span style="color: #e03e2d;">Advanced Password Management and Storage</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/advanced-encryption-chapter"><strong><span style="color: #e03e2d;">Advanced Encryption Chapter</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/acceptable-places-to-communicate-securely-with-another-party"><strong><span style="color: #e03e2d;">Acceptable Places to Communicate Securely with Another Party</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/file-change-detection-or-integrity-monitoring-systems"><strong><span style="color: #e03e2d;">File-Change Detection or Integrity Monitoring Systems</span></strong></a></li> <li><a href="https://www.privacytools.io/guides/emergency-preparedness-a-plan-for-worst-case-scenarios"><strong><span style="color: #e03e2d;">Emergency Preparedness: A Plan for Worst Case Scenarios</span></strong></a></li> </ul> </li> </ul> <h3>About the Authors</h3> <p>Hello. My name is CryptoSeb or just Seb. Back in 2015, some online friends and I noticed a gap in the information being provided to people to better their knowledge of security, privacy, and anonymity in our ever-changing digital world. We could find papers, forum posts, and discussion around little bits and pieces but we had to do the searching ourselves and put it all together. It really wasn’t suitable for like 75% of the Internet population. So in early 2016, I had this idea of writing a paper that would encompass everything related to security, privacy, and anonymity but tailor it to all walks of Internet users; whether that is my 59-year-old grandma, or Edward Snowden like individuals. This paper, titled “The Crypto Paper” resembles the beginning of my alias because it largely a collection of my own personal thoughts, knowledge, and experiences. As well, this paper is not going to be something that strikes every individual in a good spot 100% of the time – you WILL disagree with some of what is included and that is perfectly fine. We encourage you to submit corrections or give suggestions on how we can improve it.</p> <p dir="auto"><strong>Bitmarauder</strong> As a cypherpunk and wanderer on these here wires, from time to time you will find that my hands feel the need make note of what I've learned in my travels in search for truth and freedom. By trade/study I work in infosec. My anonymity and privacy when necessary are huge.</p> <p dir="auto"><strong>Reviewing / Content Editing</strong><br>Originally, I had these high hopes for this paper to get peer-reviewed by some big(ger) name people in the privacy/security industry and even though many of them agreed to take on the task, lives are busy and the paper is 61 pages. So I am just going to have to settle with a little more harsh criticism from the public. I know there has to be places in here where I am dead wrong or you think I should add/take out something so I encourage you to really speak up if you see the need. I intend on publishing an edited version 1-2 months from the initial release.</p> <p dir="auto"><em>Note: Contact information of the authors removed since they've decided to take the paper offline.</em></p> <p dir="auto"><em></em></p> <h3 dir="auto">Reasons Behind The CryptoPaper</h3> <p dir="auto">Back in mid 2015, I (among other friends) started to see a real issue with the people using the Internet. Not only were they using it completely incorrectly on so many different levels, but they didn’t have the resources to acquire accurate knowledge and change their behaviors. It isn’t necessarily the fact that people want to use the Internet incorrectly, it’s just that we have come from Windows 95, 50 pound desktop computers, 512mb of RAM, and Minesweeper, to petabyte servers, Google, self-driving cars, and ransomware in the course of 16 years. We have made technological leaps forward and it is literally consuming the massive portion of the population who weren’t born/raised in this era or who don’t have an interest in becoming “tech-savvy”. And yes, consuming is the right word. I swear if a computer could eat you, some of the 65-year-old people trying to text their grandchildren would be gone. That phone would have a mental break down as they ‘attempt’ to use it correctly and just eat them.</p> <p dir="auto">But I have nothing against people who cannot seem to understand the security/privacy/anonymity aspects revolving around technology. That is actually the reason for this paper being developed in the first place. I want all my grandmas to be successful Internet users and not have to approach it with such a disconnect. Furthermore, we want avid tech people to also find a benefit and learn a little as well.</p> <p dir="auto"><strong>Uniquely Designed</strong></p> <p dir="auto">Designing something of this magnitude wasn’t as easy as you would think. I needed a way to separate the content so it had some sort of “flow” to it. But I also needed it to be something that wouldn’t lose the less experienced people right off the start. The idea I came up with was the split it into four categories of people:</p> <ul dir="auto"> <li>Common Internet Folk</li> <li>Business &amp; Tech Geeks</li> <li>Government Level Individuals</li> <li>Edward Snowden?</li> </ul> <p dir="auto">As you move up from one category to the next, the information becomes more intensive and techy. I hope that this method ensures adequate learning on behalf of ALL Internet individuals and we definitely encourage you to learn in the sections where you are lost. This is meant to be a tool of knowledge to promote your learning!</p> <h3 dir="auto">Conclusion</h3> <p dir="auto">Finally, I am able to say that The Crypto Paper is complete! It is a huge achievement for me to say that. Writing this paper has taken countless hours, lots of research, and one too many discussions with people who have more knowledge and experience than myself. One of the older fellows that I have nightly coffee with made a comment to me that it was nearly impossible for him to keep up with the advancements we are making in technology and the way he talked about it, it was almost like he was just trying to stay afloat. This hit me as rather concerning. If we are moving this fast into a digitized world, where will my parents be in 5, 10, 20 years time? Would they be able to keep up? Or would they feel just as helpless? I got a lot of the inspiration for writing this paper from the amount of people I talk to who have zero clue how to keep up, stay secure, and even properly run a business in our Internet world today. But because I have been involved in, and always really interested in learning about security, privacy, and anonymity, I wasn’t just going to stop with the basics. I have had a fair amount of previous experience with the areas covered in this paper. So I figured it would be a great challenge to take on and I definitely had fun.</p> <p dir="auto">Even if you were only able to get through the first category/section before being completely lost, I hope you were able to take something away from The Crypto Paper. And if you made it all the way to the end and had some concerns with things I have written about or views that I have, I encourage you to get in touch and discuss them with me. I mentioned in the introduction that this is largely a construction of the experiences and knowledge I have had and acquired over the last few years being a part of this “scene” so I know it will definitely not be perfect. Everyone who is well versed in these fields will have their own views on the topics discussed and many will have a lot more knowledge than myself. So if you are one of these individuals, please don’t be shy. Out of all of this, I want it to be a learning tool for not only those reading, but also myself. I will work on and improve this paper as I have time and as I receive criticisms and suggestions.</p> <p dir="auto">Please feel free to contact either of us with any and all concerns, questions, or feedback. We look forward to hearing from you! <strong>Official Subreddit:</strong> <a href="https://reddit.com/r/cryptopaper" rel="nofollow">https://reddit.com/r/cryptopaper</a></p> <p dir="auto">Thanks so much for reading. I encourage you to link to this paper, print it off, share it in any way you see fit. Just please do not alter the paper in a way that would discredit the many hours I have put into developing and writing it and the many hours others have spent reviewing it before it went public.</p> <p dir="auto">Seb</p> <p dir="auto"></p> Sun, 27 Mar 2022 13:53:11 +0700 3b018459304931a62eff3cefcbbc2bd3 Smart Devices: Accepted Tracking for Convenience? https://www.privacytools.io/guides/smart-devices-accepted-tracking-for-convenience <p>You got it; your smartphone is an advanced spying/tracking device that: Thu, 24 Mar 2022 11:54:38 +0700 a9bc7c3dd28fc88c9f1c9fc762653690 Tracking: Your Operating Systems and Apps telemetry services https://www.privacytools.io/guides/tracking-your-operating-systems-and-apps-telemetry-services <p>Whether it is Android, iOS, Windows, macOS, or even Ubuntu. Most popular Operating Systems now collect telemetry information by default even if you never opt-in or opted-out from the start. Thu, 24 Mar 2022 11:49:24 +0700 fd7fb6c8b73be540a27a7b9ab8eacc30 Here is how even your CPU can be used to track you https://www.privacytools.io/guides/here-is-how-even-your-cpu-can-be-used-to-track-you <p>All modern CPUs are now integrating hidden management platforms such as the now infamous Intel Management Engine<sup id="fnref:103" role="doc-noteref"></sup> and the AMD Platform Security Processor. Thu, 24 Mar 2022 11:44:20 +0700 fe7ff9545e05e98c8ea3b4c57cfb36c1 You can be tracked via your Bluetooth MAC address https://www.privacytools.io/guides/you-can-be-tracked-via-your-bluetooth-mac-address <p>Your Bluetooth MAC is like the earlier MAC address except it is for Bluetooth. Thu, 24 Mar 2022 11:41:55 +0700 4a69c2865752326e005956da0b078bd1 You can be tracked via your Wi-Fi or Ethernet MAC address https://www.privacytools.io/guides/you-can-be-tracked-via-your-wi-fi-or-ethernet-mac-address <p>The MAC address<sup id="fnref:99" role="doc-noteref"></sup> is a unique identifier tied to your physical Network Interface (Wired Ethernet or Wi-Fi) and could of course be used to track you if it is not randomized. Thu, 24 Mar 2022 11:37:54 +0700 12fb6b1479ebb3e5a3376d5a72076e15 You can be tracked via your IMEI, IMSI and by extension, your phone number https://www.privacytools.io/guides/you-can-be-tracked-via-your-imei-imsi-and-by-extension-your-phone-number <p>The IMEI (International Mobile Equipment Identity) and the IMSI (International Mobile Subscriber Identity<sup id="fnref:85" role="doc-noteref"></sup>) are unique numbers created by cell phone manufacturers and cell phone operators. Thu, 24 Mar 2022 11:32:25 +0700 cfcb4195b7c74f21bce584fc0c8bc634 Devices can be tracked even when offline and invade your privacy https://www.privacytools.io/guides/devices-can-be-tracked-even-when-offline-and-invade-your-privacy <p>You have seen this in action/spy/Sci-Fi movies and shows, the protagonists always remove the battery of their phones to make sure it cannot be used. Thu, 24 Mar 2022 11:26:50 +0700 193cf84fdfb60c0edd8825720df3ba3a How to Counteract Forensic Linguistics https://www.privacytools.io/guides/how-to-counteract-forensic-linguistics <p>Stylometry is our personal and unique writing style. No matter who you are, you have a unique finger printable, and traceable writing style. Thu, 24 Mar 2022 09:01:47 +0700 aa1fe97c91fec0f7065a039596d79a35 Tracking your digital fingerprint, footprint and online behavior https://www.privacytools.io/guides/tracking-your-digital-fingerprint-footprint-and-online-behavior <p>This is the part where you should watch the documentary “The Social Dilemma”<sup id="fnref:143" role="doc-noteref"></sup> on Netflix. Thu, 24 Mar 2022 08:51:51 +0700 89e193a8550cd970806f065a4be6a30d How your anonymized Tor/VPN traffic can be used to track you down https://www.privacytools.io/guides/how-your-anonymized-tor-vpn-traffic-can-be-used-to-track-you-do <p>Tor and VPNs are not silver bullets. Many advanced techniques have been developed and studied to de-anonymize encrypted Tor traffic over the years<sup id="fnref:68" role="doc-noteref"></sup>. Thu, 24 Mar 2022 08:45:02 +0700 25cbaa7159841a7bd314474b1a054c04 Man-in-the-middle attacks with malicious & rogue Wi-Fi access points https://www.privacytools.io/guides/man-in-the-middle-attacks-with-malicious-rogue-wi-fi-access-points <p>These have been used at least since 2008 using an attack called “Jasager” and can be done by anyone using self-built tools or using commercially available devices such as Wi-Fi Pineapple<sup id="fnref:65" role="doc-noteref"></sup>. Thu, 24 Mar 2022 08:39:01 +0700 ad4211ddfa7a487e6089603a916d31b7 Geolocation: How Wi-Fi and Bluetooth devices track you https://www.privacytools.io/guides/geolocation-how-wi-fi-and-bluetooth-devices-track-you <p>Geolocation is not only done by using mobile antennas triangulation. It is also done using the Wi-Fi and Bluetooth devices around you. Thu, 24 Mar 2022 08:35:49 +0700 1eb9b9165bf35acce87c53cfaffe1e29 Warning about smartphones and smart devices https://www.privacytools.io/guides/warning-about-smartphones-and-smart-devices <p>When conducting sensitive activities, remember that: Thu, 24 Mar 2022 08:30:28 +0700 8a46d6204f871db06cf364bdd4f2a61c How your RFID enabled devices is tracking you https://www.privacytools.io/guides/how-your-rfid-enabled-devices-is-tracking-you <p>RFID stands for Radio-frequency identification, it is the technology used for instance for contactless payments and various identification systems. Thu, 24 Mar 2022 08:24:10 +0700 3c31a3340b0ffd435d57b518c73cb6db Virtualization: Three big reasons how Virtual Machines can help to improve your privacy https://www.privacytools.io/guides/virtualization-three-big-reasons-how-virtual-machines-can-help-to-improve-your-privacy <p>Basically, it is like the Inception movie with computers. You have emulated software computers called Virtual Machines running on a physical computer. Thu, 24 Mar 2022 08:18:41 +0700 0d602b1211ebd8b0d75f7b54ae24d34f How DNS and IP requests can be used to track you and how to avoid it https://www.privacytools.io/guides/how-dns-and-ip-requests-can-be-used-to-track-you-and-how-to-avoid-it <p>DNS stands for “Domain Name System” and is a service used by your browser (and other apps) to find the IP addresses of a service. Thu, 24 Mar 2022 08:08:11 +0700 0a6bbd194e19624ae1c59592b3db12f8 How your public IP address can lead back to you. Use these IP tools to find out what is exposed https://www.privacytools.io/guides/how-your-public-ip-address-can-lead-back-to-you <p>Your IP address is the most known and obvious way you can be tracked. That IP is the IP you are using at the source. This is where you connect to the internet. Thu, 24 Mar 2022 07:37:57 +0700 c30fff8db1ec23976eabe7985620ed10 Finding safe places with decent public Wi-Fi for better privacy https://www.privacytools.io/guides/finding-safe-places-with-decent-public-wi-fi-for-better-privacy <p>You need to find safe places where you will be able to do your sensitive activities using some publicly accessible Wi-Fi (without any account/ID registration, avoid CCTVs). Wed, 23 Mar 2022 22:33:02 +0700 cbd135033e0e03deef37c814e7817e59 Using long-range Antenna to connect to Public Wi-Fis from a safe distance https://www.privacytools.io/guides/using-long-range-antenna-to-connect-to-public-wi-fis-from-a-safe-distance <p>It is possible to access/connect to remote distant Public Wi-Fis from a distance using a cheap directional Antenna that looks like this.</p> <p> Wed, 23 Mar 2022 22:25:28 +0700 fac36715cd84a6b1ade05b55a47f9a6c Accessing the internet as safely as possible when Tor and VPNs are not an option https://www.privacytools.io/guides/accessing-the-internet-as-safely-as-possible-when-tor-and-vpns-are-not-an-option <p>There might be worst-case situations where using Tor and VPNs are not possible due to extensive active censorship or blocking.</p> <p> Wed, 23 Mar 2022 22:15:58 +0700 31f75b61caf0ea7b6a5df027277cab23 Using Tor bridges in hostile environments https://www.privacytools.io/guides/using-tor-bridges-in-hostile-environments <p>In some environments, your ISPs might be trying to prevent you from accessing Tor. Or accessing Tor openly might be a safety risk. Wed, 23 Mar 2022 18:45:45 +0700 fa88554c0dea3088d0bc5052ea8107c2 Installing and using desktop Tor Browser https://www.privacytools.io/guides/installing-and-using-desktop-tor-browser <p>This is valid for Windows, Linux, and macOS.</p> <ul> <li><a href="https://www.privacytools.io/#browser" target="_blank" rel="noopener">Download and install Tor Browser</a></li> <li>Open Tor Browser</li> </ul> <p> Wed, 23 Mar 2022 17:21:54 +0700 506406bc90bd6d09ff5ff162f9d70a4b