Privacy Guides: The Expert's Guide to Online Privacy in 2023
https://www.privacytools.io/guides/
Protect your digital footprint with the expert's guide to online privacy. Our comprehensive guides cover everything you need to know to stay safe online.Tue, 25 Jul 2023 09:46:45 +0700How to add a custom domain on Skiff for free
https://www.privacytools.io/guides/free-custom-domain-skiff
<p>If you’re looking for the <a href="https://www.privacytools.io/privacy-email">most private email provider</a>, adding a custom domain should be a key part of your checklist. Domains enhance your privacy with greater ownership, portability, and aliasing to make sure you stay secure in all email communications.Tue, 25 Jul 2023 09:07:24 +07002b210021170ff94acb4e232d34a8c0e2 Internxt Unveiled: Safeguarding Your Encrypted Files and Photo Memories
https://www.privacytools.io/guides/internxt-encrypted-files-and-photos
<p>Let me introduce you to Internxt, a great alternative to Google Drive, Dropbox, WeTransfer and Google Photos.Thu, 22 Jun 2023 12:25:48 +070069c32123d3276bb60b5dfa1ba8bb613eSkiff: Gmail & Workspace Alternative with Encrypted and Decentralized IPFS Storage
https://www.privacytools.io/guides/skiff-decentralized-ipfs-storage
<p>If you're looking for a Gmail or Google Workspace alternative, then <a href="https://skiff.com/" target="_blank" rel="noopener">Skiff products</a> might catch your interest.Tue, 06 Jun 2023 09:35:11 +070058987e6e928b80074b978b38b82acdf5Phone and Laptop Seizures at Airports and Borders - Privacy Travel Guide
https://www.privacytools.io/guides/phone-and-laptop-seizures-at-airports-and-borders
<p>The world and its borders are slowly opening up after strict Covid lockdowns, and people are looking forward to travelling again. While this is great and fun, keep in mind that you might be subject to random searches and highly invasive and traumatic experiences.Sun, 01 Jan 2023 16:58:00 +0700d46130f4b9c932f674d11c03885642f2Android: Simple, open-source apps without ads, tracking and unnecessary permissions
https://www.privacytools.io/guides/android-simple-open-source-apps-without-ads-tracking
<p>I want to introduce you to a great Android developer team that released countless alternatives to apps that usually come for free but invade your privacy.Thu, 08 Dec 2022 10:57:18 +0700956da46473a842e64c454e810eb1008cExodus for Android: Finds trackers embedded in all your apps
https://www.privacytools.io/guides/exodus-for-android-finds-trackers
<p>Today, I want to shed light on a fairly unknown but powerful Android app that helps you to locate trackers embedded in all your smartphone apps.Thu, 01 Dec 2022 15:35:40 +07009db099d1786fa7fe643499148ddee82c7 Publicly Known LastPass Security Breaches since 2011
https://www.privacytools.io/guides/7-publicly-known-lastpass-security-breaches-since-2011
<p>The security team of the popular password manager LastPass can't seem to catch a break. This is the second security breach this year, and they are connected.Thu, 01 Dec 2022 12:01:47 +0700dd71c2977cbc0481ed59868f96e6222aAirDrop feature limited ahead of protests in China
https://www.privacytools.io/guides/airdrop-feature-limited-ahead-of-protests-in-china
<p>Apple Inc. has limited the AirDrop wireless file-sharing feature on iPhones in China after the mechanism was used by protesters to spread images to other iPhone owners. AirDrop allows the quick exchange of files like images, documents, or videos between Apple devices.Wed, 30 Nov 2022 16:20:37 +0700ce63a22f67b6272ef50c6e1a35013dabThe Eufy Security Camera Privacy Scandal: Unencrypted Cloud Footage
https://www.privacytools.io/guides/eufy-security-camera-privacy-scandal
<p>Twitter user Paul Moore discovered recently that his Eufy home security camera leaks unencrypted private images of faces and names to the cloud, even with cloud storage disabled.Wed, 30 Nov 2022 12:06:20 +07001a73fbf8947d69ff1b2cc5536b863550Encrypted Twitter DMs soon for improved privacy with Signal Protocol
https://www.privacytools.io/guides/encrypted-twitter-privacy
<p>Twitter is working on end-to-end encrypted Twitter DMs under the new leadership of Elon Musk.Mon, 28 Nov 2022 12:26:21 +070048b8aebbd9841616b5d02d0806eee894Berty Messenger: Private, secure, distributed. Even works offline!
https://www.privacytools.io/guides/berty-messenger
<p>You might wonder why you should be interested in another instant messenger app? Berty comes with heaps of neat feature, is packed in an appealing and modern design. It's secure but at the same time easy-to-use. It could be something your friends <strong>actually</strong> going to use.Wed, 26 Oct 2022 09:44:09 +0700aff8a486627aac48d2dad50a9899d3ccData Breach Prevention to Protect Your Privacy
https://www.privacytools.io/guides/data-breach-prevention-to-protect-your-privacy
<p>Data breaches in a nutshell: Data breaches happen every day. It has become more important than ever to understand what a data breach is, how it happens, and how we, as users, can prevent it.Mon, 17 Oct 2022 10:13:10 +070039c257b29d07aa77b3010a97737719b2Is the Five Eyes Alliance a Threat to Your Privacy?
https://www.privacytools.io/guides/five-eyes-alliance-threat-to-privacy
<p>The Five Eyes is an international intelligence-sharing alliance. The Five Eyes countries are Canada, Australia, New Zealand, the United Kingdom, and the United States.Sat, 15 Oct 2022 11:10:06 +0700724068b3cc5e1693b80a76b41d91650bWireGuard vs. OpenVPN: Which VPN protocol is better?
https://www.privacytools.io/guides/wireguard-vs-openvpn
<p>When you connect to a VPN, your data travels through a secure encrypted tunnel to a VPN server, where you’re assigned an IP address. A VPN protocol refers to the rules and instructions determining how the encrypted tunnel is formed.Fri, 23 Sep 2022 10:17:50 +0700e43874fbd4c2162881ffefb12fc5baf0Proxy vs. VPN: Which One Should You Choose?
https://www.privacytools.io/guides/proxy-vs-vpn
<p>Virtual private networks (VPN) and proxy servers are both great tools for protecting your identity online. People tend to think of them as doing the same thing.</p>
<p>Wed, 21 Sep 2022 19:04:39 +070001e3df1d03397384ea4e0d38f0864e3cSentinel dVPN Guide: New, Exciting and Decentralized. Everything Explained
https://www.privacytools.io/guides/sentinel-dvpn
<p>A <a href="https://www.privacytools.io/dvpn">decentralized VPN (dVPN)</a>, like a more traditional <a href="https://www.privacytools.io/privacy-vpn">centralized VPN (cVPN)</a>, hides your IP address, encrypts your data, changes your digital geolocation, and allows you to be safer when browsing the internet.Wed, 21 Sep 2022 08:35:08 +07000aa980cd88010e55580ee45e05b5ab4aVPN vs Tor: Which one is right for you?
https://www.privacytools.io/guides/vpn-vs-tor
<p>Online security and privacy are becoming increasingly important. Therefore, it isn’t surprising to see many people turning to internet security tools for more online protection.Fri, 09 Sep 2022 21:20:06 +0700023b42235cdc8c2296230668c20deafePrivacy, Cybersecurity and Anonymity - Difference Explained
https://www.privacytools.io/guides/privacy-cybersecurity-anonymity-difference
<p>Privacy, cybersecurity and anonymity are all different concepts that are often used interchangeably. Understanding the difference between these three is crucial to understanding how they work together to protect your identity online.Thu, 25 Aug 2022 00:08:22 +0700effa4b402383d3f5358224787800f56bGrammarly Alternative: LanguageTool an open-source grammar and spell checker
https://www.privacytools.io/guides/grammarly-alternative-languagetool
<p>Grammarly is a popular proofreader who helped millions of people around the world to gain confidence in writing. In this post, you'll learn about an even better open-source Grammarly alternative, called LanguageTool.Sat, 20 Aug 2022 16:27:15 +07008bb3d687ef53cd2b53f344947d8c077cTop 10: Privacy Tools List with Out-of-the-Box Solutions
https://www.privacytools.io/guides/top-10-privacy-tools
<p>In this list, we're introducing you to ten great privacy tools that come with out-of-the-box privacy features that don't require complicated setup or configuration procedures. Ideal for beginners or when setup time is a crucial factor.</p>
<p>Sat, 20 Aug 2022 12:59:36 +0700bc5c898116699013ddca44301d753004How to access reddit without ads and tracking while benefiting from faster page load times
https://www.privacytools.io/guides/how-to-access-reddit-without-ads-tracking
<p>Reddit ranks in the top 10 of most visited website in the world. Part of their business model is serving ads to their users and gain data with tracking. Nonetheless redditors all over the world appreciate and love the website for it's user submitted content.Sat, 13 Aug 2022 19:44:01 +070084737f0f348998f141d828fdcd6ba029Enforce Privacy & Security Best-Practices on Windows and macOS: privacy.sexy
https://www.privacytools.io/guides/enforce-privacy-security-on-windows-and-macos
<p>Today we present you another <strong>GitHub Gem:</strong> privacy.sexy is an open-source privacy tool to enforce security and privacy best-practices on Windows and macOS.</p>
<p>Tue, 05 Apr 2022 17:32:28 +0700ee99d40bc36294adc0e9324c8213759aJonah Aragon's (PrivacyGuides) Failed Attempt to Takeover PrivacyTools.io
https://www.privacytools.io/guides/jonah-aragon-privacyguides-failed-attempt-to-takeover
<p>This long overdue blog post covers the failed takeover attempt of this website, cryptocurrency donations theft, a successful smear campaign, corruption and censorship. All initiated, fabricated by <strong>Jonah Aragon</strong>, the project lead of PrivacyGuides.org and <strong>Aragon Ventures LLC</strong>.Fri, 01 Apr 2022 22:35:09 +07008c73706ea750cfa33f14b0919a5aa7c7Introduction of GitHub 💎 Gems by PrivacyTools.io
https://www.privacytools.io/guides/introduction-of-github-gems
<p dir="auto">What are GitHub Gems by <a href="https://www.privacytools.io/" rel="nofollow">PrivacyTools.io</a>?Wed, 30 Mar 2022 17:35:16 +07005c0a8d67bcafad8f6a35f4f207e77425Open Source Portfolio Managers and Trackers for Wealth Management
https://www.privacytools.io/guides/open-source-portfolio-manager-privacy
<p>Today we present you two <strong>GitHub Gems</strong>: Portfolio Tracker, Wealth Management, Accounting and Analytics Tools that protect your privacy. Supports stocks, EFTs and crypto currencies. Both tools are respecting your privacy.Wed, 30 Mar 2022 14:26:46 +0700bdf21e53f3be72bac74f51c045fb6a4bWhistleblower Guide: How Privacy Tools Can Protect You From Retaliation
https://www.privacytools.io/guides/whistleblower-guide
<p>Picture this: You’re in a position where you want to expose wrongdoing but you’re afraid of retaliation. Whether it’s a company or a government, someone is putting lives, the environment, or society at risk with their actions.Tue, 29 Mar 2022 09:10:33 +07003a43313bad6eca106cfecad14c7c70b48 Simple Stupid Flat File CMS: Free, User-Friendly and Open Source
https://www.privacytools.io/guides/8-simple-stupid-flat-file-cms-free-user-friendly-and-open-source
<p>You've decided to start your own website or blog and don't know where to start?Mon, 28 Mar 2022 20:01:35 +070040d4ee146ac628ceddf4e018586eff3bManufacturer Tools for Wiping HDD and SSD Drives
https://www.privacytools.io/guides/manufacturer-tools-for-wiping-hdd-and-ssd-drives
<p id="appendix-j-manufacturer-tools-for-wiping-hdd-and-ssd-drives">Always check your laptop BIOS/UEFI for native utilities first.Mon, 28 Mar 2022 11:14:04 +070049137a12accc8ddfa2ce40c9e4fc3a03Emergency Preparedness: A Plan for Worst Case Scenarios
https://www.privacytools.io/guides/emergency-preparedness-a-plan-for-worst-case-scenarios
<p dir="auto">If we were to place security, privacy, and anonymity onto a sliding scale from 1-100, nobody is going to be able to achieve all 100s.Mon, 28 Mar 2022 10:39:16 +0700bea7fe09624aa594c20d4d72ae6a271eFile-Change Detection or Integrity Monitoring Systems
https://www.privacytools.io/guides/file-change-detection-or-integrity-monitoring-systems
<p>Pretty much the only thing left to do is to make sure that our data is not being changed or altered without our prior knowledge or consent.Mon, 28 Mar 2022 10:34:31 +07002238587dd7e7424ecdbc17fcce0c71ebAcceptable Places to Communicate Securely with Another Party
https://www.privacytools.io/guides/acceptable-places-to-communicate-securely-with-another-party
<p dir="auto">You might never think of physical security coming into play too much if you have a very high level of Internet/Device security.Mon, 28 Mar 2022 10:29:48 +070085cfcef6c6a002f86410ffcb76cde22eAdvanced Encryption Chapter
https://www.privacytools.io/guides/advanced-encryption-chapter
<p dir="auto">I know, I have already discussed different areas of encryption in varying levels of detail. But I think an aspect that needs to be highlighted even further is a point I made shortly above.Mon, 28 Mar 2022 10:23:10 +07004029bb42f5f366b23c0972b983b355d1Advanced Password Management and Storage
https://www.privacytools.io/guides/advanced-password-management-and-storage
<p>In the beginning sections of this paper, I talked a bit about creating strong passwords and how to store them securely.Mon, 28 Mar 2022 10:18:01 +0700d16a227074f923effb028cb2d23e2311Using Virtual Private Networks (VPN) and Tor Together
https://www.privacytools.io/guides/using-virtual-private-networks-vpn-and-tor-together
<p dir="auto">The issue once you get to need such a level of security that you find yourself categorized in a paper like this is you are really the only person who knows what you need to keep yourself safe.Mon, 28 Mar 2022 10:13:13 +07003fc1cbc264fb653253b4bada619c7d57The Issues with Free and Open-Source Software for Privacy Tools
https://www.privacytools.io/guides/the-issues-with-free-and-open-source-software-for-privacy-tools
<p dir="auto">Once you get down to this level, you almost need to reevaluate everything about your threat model and what you are doing to protect yourself.Mon, 28 Mar 2022 10:05:30 +0700891f12dd65400caf8efec4c92aff7850Secure Operating Systems: Tails, Debian and Qubes OS
https://www.privacytools.io/guides/secure-operating-systems
<p>Before we dive to heavily into the tactics that are going to keep an individual at this level secure from a big name adversary, we have to consider the operating systems that we are doing our work on, communicating through, and using to send people information.Sun, 27 Mar 2022 21:57:56 +0700cb04c5b3143c58ca109bde7a39d28dbeDeleting and Decluttering Data to Improve Privacy
https://www.privacytools.io/guides/deleting-and-decluttering-data-to-improve-privacy
<p>After you have put all of the above pages to good use, you are going to be left with a lot of unneeded data.Sun, 27 Mar 2022 21:53:28 +0700c20bb9f1d323a324007d7b86d893b213Anonymity and the Challange of Payment Methods
https://www.privacytools.io/guides/anonymity-and-the-challange-of-payment-methods
<p>The issue with anonymity is that it is fairly easy to acquire online until you have to pay for something.Sun, 27 Mar 2022 21:46:50 +07000359b5c03b82c25a900418c21af724bbWhat is Metadata and how can it hurt your Privacy?
https://www.privacytools.io/guides/what-is-metadata-and-how-can-it-hurt-your-privacy
<p>Metadata is data that describes other data.Sun, 27 Mar 2022 21:43:16 +0700597e963b333b87f7c20fd1765aad8e27Cell Phones are not Devices that Aid in Being Anonymous
https://www.privacytools.io/guides/cell-phones-are-not-devices-that-aid-in-being-anonymous
<p>It isn’t so obvious why after we discussed earlier about the strong encryption on a newer iPhone, they might not be considered a tool for anonymity but it is true. Cell phones are not devices that aid in you being anonymous.Sun, 27 Mar 2022 21:38:11 +070054cf58656634b13fc01f7e6739a38d3eKeeping Personal Information Out and Using an Alias to Hide Your Real Identity
https://www.privacytools.io/guides/keeping-personal-information-out-and-using-an-alias-to-hide-your-real-identity
<p dir="auto">If you are reading this but have no need for anonymity and really can’t see where it would fit into your Internet life, I at least hope you can imagine a situation where someone else might need it.Sun, 27 Mar 2022 21:31:43 +070045b92241bbed7f810c5e514bc37346edGaining Anonymity: The Tor Network & Tor Browser Bundle
https://www.privacytools.io/guides/gaining-anonymity-the-tor-network-tor-browser-bundle
<p>My first step in looking at anonymity is making use of the TBB and the Tor network. Tor was released in 2002 and has since evolved into a tool that is used by millions of people worldwide.Sun, 27 Mar 2022 21:24:46 +0700bea70639fab77e0211b3dc4a2a4d5640GPG/PGP Based Encryption & Authentication for Emails
https://www.privacytools.io/guides/gpg-pgp-based-encryption-authentication-for-emails
<p dir="auto">One of the other things you will have likely noticed me touching on is companies who are willing to share their PGP Key for customers so they can use email + PGP for communication to support.Sun, 27 Mar 2022 21:16:45 +0700554f55e2fe48f946af3e65fa9c971dd8The Importance of Free and Open-Source Software for Privacy Tools
https://www.privacytools.io/guides/the-importance-of-free-and-open-source-software-for-privacy-tools
<p>Getting back to the good stuff, I have talked in the above pages about a term called FOSS or open source, or the long form Free, Open Source Software.Sun, 27 Mar 2022 21:11:04 +0700242d5e7e6ea07299119adfd9785cf2baBreaking Down a Privacy Service: What's Really Under the Rug?
https://www.privacytools.io/guides/breaking-down-a-privacy-service-what-s-really-under-the-rug
<p>By now, the hope is that you have really begun to look at the services you are using on a day-to-day basis.Sun, 27 Mar 2022 21:03:09 +07000d81ff3851e50218784e76b11b33bdf5How is the Five Eyes Intelligence Alliance Related to Your Privacy?
https://www.privacytools.io/guides/how-is-the-five-eyes-intelligence-alliance-related-to-your-privacy
<p dir="auto">The “5 Eyes” countries refer to 5 countries (United States, Canada, The United Kingdom, Australia, and New Zealand) that have an intelligence agreement known as the <a href="https://en.wikipedia.org/wiki/UKUSA_Agreement" target="_blank" rel="noopener">UKUSA Agreement</a> to share information with one another.Sun, 27 Mar 2022 20:54:54 +070028485da5057ab49c30ef0fdfdb7ab366A Guide for Firewalling Your Network Connections: Windows, MacOS and Linux
https://www.privacytools.io/guides/a-guide-for-firewalling-your-network-connections-windows-macos-and-linux
<p>One of the other ways one can secure their connection to the Internet is to make sure that all incoming and outgoing connections are being passed through a Firewall.Sun, 27 Mar 2022 16:59:05 +07003395ce9ad492e591f44145ff907b67bcA Complete Guide to Virtual Private Networks (VPNs)
https://www.privacytools.io/guides/a-complete-guide-to-virtual-private-networks-vpns
<p>There are very few locations where I actually trust connecting directly to the Internet.Sun, 27 Mar 2022 16:46:52 +0700e0e7e67d83b3332bd141e2d67d026ab6Full Disk Encryption: Strongest Counter to Surveillance, Attack and Theft of Your Devices
https://www.privacytools.io/guides/full-disk-encryption-strongest-counter-to-surveillance-attack-and-theft-of-your-devices
<p>One of your strongest counters to surveillance, attack, and theft of your devices is making sure the data on them is secure. Sun, 27 Mar 2022 16:36:13 +070078fbda2519815acc015e446a49cbb085Securing Online Accounts: Always use Two-Factor Authentication
https://www.privacytools.io/guides/securing-online-accounts-always-use-two-factor-authentication
<p>Hopefully by now you have registered for a ProtonMail or Tutanota account and are ready to start transferring some accounts over.Sun, 27 Mar 2022 16:30:17 +0700223ae80c5dfbf0255f96b0b8d4fbe1b8Storing & Sharing in the Cloud: Finding the Right Provider to Protect Your Privacy
https://www.privacytools.io/guides/storing-sharing-in-the-cloud-finding-the-right-provider-to-protect-your-privacy
<p dir="auto">Right alongside messaging people in a secure manner, we have to think about how and where we are storing files in the cloud, and how those files are being shared with others.Sun, 27 Mar 2022 16:25:07 +0700f88fbb29f5c264366d9e7b43dcf44c90Apple's iMessage Service and Privacy
https://www.privacytools.io/guides/apple-s-imessage-service-and-privacy
<p>Apple has provided a messaging service since the dawn of the iPhone many years ago and expanded on it to be a very privacy conscious and secure way of communicating.Sun, 27 Mar 2022 16:18:16 +07001d1a649fd8b1076123202d71b8f4fa14Messaging with Signal by Open Whisper Systems
https://www.privacytools.io/guides/messaging-with-signal-by-open-whisper-systems
<p dir="auto">Signal is marketed on the Open Whisper Systems website as “Privacy that fits in your pocket”.Sun, 27 Mar 2022 16:11:56 +07005e07bd5478380e51e855f5e982fd9a8eMessaging privately and securely with the XMPP/Jabber Protocol
https://www.privacytools.io/guides/messaging-privately-and-securely-with-the-xmpp-jabber-protocol
<p>The one thing missing from Version 2 of the paper was the XMPP/Jabber Protocol and OTR (off-the-record) for messaging privately and securely.Sun, 27 Mar 2022 16:04:22 +0700614181863233aa9a1b1a7e9af8b3c9eaDaily go-to Secure Messaging Apps for Better Privacy
https://www.privacytools.io/guides/daily-go-to-secure-messaging-apps
<p><strong>Warning:</strong> This section of <a href="https://www.privacytools.io/guides/the-crypto-paper">The Crypto Paper</a> is <span style="color: #e03e2d;">outdated</span>. Wire went through some severe Privacy policy changes: Sun, 27 Mar 2022 15:54:19 +07006fd979bebb16db30d8c900d62aa83ad4Secure Email in Switzerland: ProtonMail
https://www.privacytools.io/guides/secure-email-in-switzerland-protonmail
<p dir="auto">Before coming across the ProtonMail crowdfunding campaign, I was an avid user of email services like Yahoo and Gmail.Sun, 27 Mar 2022 15:41:39 +070003c138c76ceb8e2317538e2a5780f9b9Privacy Tools: Securely Transmitting Information - Messaging & Calling
https://www.privacytools.io/guides/privacy-tools-securely-transmitting-information-messaging-calling
<p>Currently, technology allows us to communicate in so many different ways with each other that even 30 years ago we were unable to do.Sun, 27 Mar 2022 15:34:27 +0700235ffcbb1cd5cf714b0a47cb35a5432dA Starting Place for Business and Tech Geeks
https://www.privacytools.io/guides/a-starting-place-for-business-and-tech-geeks
<p>I often times see people whom are clearly business people doing business related things with customers, clients, and the like in very public places in very insecure manors.Sun, 27 Mar 2022 15:20:23 +07002c11b60570609df04bf5ad053453a35cOnce it is out on the Internet, it's impossible to take it back or erase for good
https://www.privacytools.io/guides/once-it-is-out-on-the-internet-it-s-impossible-to-take-it-back-or-erase-for-good
<p dir="auto">So once you have the basics of how the Internet can work with you to keep you safe, it is vital that you determine what information you are putting out there, where it is going, and who is able to view it.Sun, 27 Mar 2022 15:13:38 +0700f5e3c2f7302016c3fd5c3e87f33f6fd4Hashing & Authentication: How are your passwords stored on websites?
https://www.privacytools.io/guides/hashing-authentication-how-are-your-passwords-stored-on-websites
<p dir="auto">It is important when we learn about encryption and using it alongside strong passwords, to also take a look at how these passwords are stored on the website’s server.Sun, 27 Mar 2022 15:08:52 +07000e583fa5f7b0239909baf9e73d4b6f5fChoosing and Using Strong Passwords and Manage them easily
https://www.privacytools.io/guides/choosing-and-using-strong-passwords-and-manage-them-easily
<p>Now, there is a difference between some terminologies here that seems to be used interchangeably when they aren’t really the same.Sun, 27 Mar 2022 15:00:38 +0700ce036276af3d26241dbeb51aed867e96How does HTTPS / Browser Encryption work?
https://www.privacytools.io/guides/how-does-https-browser-encryption-work
<p>Often times when you connect to a website, you will notice that the URL just displays the website name. But as we move into a more digital world, it is highly recommended that sites use SSL Certificates and Transport Layer Security to encrypt your connection to them.Sun, 27 Mar 2022 14:55:29 +0700d07e955d1c7711311673441b02764457Your first choice for better internet privacy: Firefox Browser
https://www.privacytools.io/guides/web-browser-for-better-internet-privacy-firefox
<p>Diving right into the specifics, I want to start off with the most common mode of accessing the World Wide Web, your Internet browser.Sun, 27 Mar 2022 14:44:35 +0700ff8237f530a7de101cb899316a36f49dYour primary tool to keep data secure: Encryption
https://www.privacytools.io/guides/your-primary-tool-to-keep-data-secure-encryption
<p>I am a pretty big believer in encryption online because encryption can be seen as the primary tool that keeps our information/data secure.Sun, 27 Mar 2022 14:35:12 +0700fa7ff743d3e2468f7506db7ceb0dc227Defining Your Threat-Model
https://www.privacytools.io/guides/defining-your-threat-model
<p>For starters, a threat-model could be defined as how an individual needs to be protected based on things like:</p>
<ul>
<li>Sun, 27 Mar 2022 14:26:58 +0700b6a2273a454a8f2cec1a37ee4302fe39The difference between Privacy, Security and Anonymity explained
https://www.privacytools.io/guides/the-difference-between-privacy-security-and-anonymity-explained
<p dir="auto"><strong>What is Privacy? </strong>Wikipedia describes privacy as “the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively” and I would largely agree that the definition provided fits the mold.Sun, 27 Mar 2022 14:19:20 +0700ba34a65a778c565870577f53c6d5433dThe Crypto Paper
https://www.privacytools.io/guides/the-crypto-paper
<p>Written by @CryptoSeb and taken offline recently. Archived, updated and web-friendly now on <strong>Privacy Guides</strong> by <a href="https://www.privacytools.io/">PrivacyTools.io</a>.</p>
<h2>Table of Contents</h2>
<p>The paper covers four different threat models:</p>
<ul dir="auto">
<li><strong><span style="color: #3598db;">1st Threat-Model: Common Internet Users</span></strong>
<ul dir="auto">
<li><a href="https://www.privacytools.io/guides/the-difference-between-privacy-security-and-anonymity-explained"><strong><span style="color: #3598db;">The difference between Privacy, Security and Anonymity</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/defining-your-threat-model"><strong><span style="color: #3598db;">Defining Your Threat-Model</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/your-primary-tool-to-keep-data-secure-encryption"><strong><span style="color: #3598db;">Your primary tool to keep data secure: Encryption</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/web-browser-for-better-internet-privacy-firefox"><strong><span style="color: #3598db;">Your first choice for better internet privacy: Firefox Browser</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/how-does-https-browser-encryption-work"><strong><span style="color: #3598db;">How does HTTPS / Browser Encryption work?</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/choosing-and-using-strong-passwords-and-manage-them-easily"><strong><span style="color: #3598db;">Choosing and Using Strong Passwords and Manage them easily</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/hashing-authentication-how-are-your-passwords-stored-on-websites"><strong><span style="color: #3598db;">Hashing & Authentication: How are your passwords stored on websites?</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/once-it-is-out-on-the-internet-it-s-impossible-to-take-it-back-or-erase-for-good"><strong><span style="color: #3598db;">Once it is out on the Internet, it's impossible to take it back or erase for good</span></strong></a></li>
</ul>
</li>
</ul>
<ul dir="auto">
<li><strong><span style="color: #169179;">2nd Threat-Model: Tech Geeks</span></strong><strong><span style="color: #169179;"></span></strong>
<ul dir="auto">
<li><a href="https://www.privacytools.io/guides/a-starting-place-for-business-and-tech-geeks"><strong><span style="color: #169179;">A Starting Place for Business and Tech Geeks</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/privacy-tools-securely-transmitting-information-messaging-calling"><strong><span style="color: #169179;">Securely Transmitting Information - Messaging & Calling</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/secure-email-in-switzerland-protonmail"><strong><span style="color: #169179;">Secure Email in Switzerland: ProtonMail</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/daily-go-to-secure-messaging-apps"><strong><span style="color: #169179;">Daily go-to Secure Messaging Apps for Better Privacy</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/messaging-privately-and-securely-with-the-xmpp-jabber-protocol"><strong><span style="color: #169179;">Messaging privately and securely with the XMPP/Jabber Protocol</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/messaging-with-signal-by-open-whisper-systems"><strong><span style="color: #169179;">Messaging with Signal by Open Whisper Systems</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/apple-s-imessage-service-and-privacy"><strong><span style="color: #169179;">Apple's iMessage Service and Privacy</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/storing-sharing-in-the-cloud-finding-the-right-provider-to-protect-your-privacy"><strong><span style="color: #169179;">Storing & Sharing in the Cloud: Finding the Right Provider to Protect Your Privacy</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/securing-online-accounts-always-use-two-factor-authentication"><strong><span style="color: #169179;">Securing Online Accounts: Always use Two-Factor Authentication</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/full-disk-encryption-strongest-counter-to-surveillance-attack-and-theft-of-your-devices"><strong><span style="color: #169179;">Full Disk Encryption: Strongest Counter to Surveillance, Attack and Theft of Your Devices</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/a-complete-guide-to-virtual-private-networks-vpns"><strong><span style="color: #169179;">A Complete Guide to Virtual Private Networks (VPNs)</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/a-guide-for-firewalling-your-network-connections-windows-macos-and-linux"><strong><span style="color: #169179;">Firewalling Your Network Connections: Windows, MacOS and Linux</span></strong></a></li>
</ul>
</li>
</ul>
<ul dir="auto">
<li><strong><span style="color: #e67e23;">3rd Threat-Model: Investigative Journalists, Government Members, CEOs<br></span></strong>
<ul dir="auto">
<li><a href="https://www.privacytools.io/guides/how-is-the-five-eyes-intelligence-alliance-related-to-your-privacy"><strong><span style="color: #e67e23;">How is the Five Eyes Intelligence Alliance Related to Your Privacy?</span></strong></a><strong><span style="color: #e67e23;"></span></strong><strong><span style="color: #e67e23;"></span></strong><strong></strong></li>
<li><a href="https://www.privacytools.io/guides/breaking-down-a-privacy-service-what-s-really-under-the-rug" target="_blank" rel="noopener"><strong><span style="color: #e67e23;">Breaking Down a Privacy Service: What's Really Under the Rug?</span></strong></a><strong><span style="color: #e67e23;"></span></strong></li>
<li><a href="https://www.privacytools.io/guides/the-importance-of-free-and-open-source-software-for-privacy-tools"><strong><span style="color: #e67e23;">The Importance of Free and Open-Source Software for Privacy Tools</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/gpg-pgp-based-encryption-authentication-for-emails"><strong><span style="color: #e67e23;">GPG/PGP Based Encryption & Authentication for Emails</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/gaining-anonymity-the-tor-network-tor-browser-bundle"><strong><span style="color: #e67e23;">Gaining Anonymity: The Tor Network & Tor Browser Bundle</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/keeping-personal-information-out-and-using-an-alias-to-hide-your-real-identity"><strong><span style="color: #e67e23;">Keeping Personal Information Out and Using an Alias to Hide Your Real Identity</span></strong><strong><span style="color: #e67e23;"></span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/cell-phones-are-not-devices-that-aid-in-being-anonymous"><strong><span style="color: #e67e23;">Cell Phones are not Devices that Aid in Being Anonymous</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/what-is-metadata-and-how-can-it-hurt-your-privacy"><strong><span style="color: #e67e23;">What is Metadata and how can it hurt your Privacy?</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/anonymity-and-the-challange-of-payment-methods"><strong><span style="color: #e67e23;">Anonymity and the Challange of Payment Methods</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/deleting-and-decluttering-data-to-improve-privacy"><strong><span style="color: #e67e23;">Deleting and Decluttering Data to Improve Privacy</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/secure-operating-systems"><strong><span style="color: #e67e23;">Secure Operating Systems: Tails, Debian and Qubes OS</span></strong></a></li>
</ul>
</li>
</ul>
<ul dir="auto">
<li><strong><span style="color: #e03e2d;">4th Threat-Model: Whistleblowers and Investigative Journalists Under Threat<br></span></strong>
<ul dir="auto">
<li><a href="https://www.privacytools.io/guides/the-issues-with-free-and-open-source-software-for-privacy-tools"><strong><span style="color: #e03e2d;">The Issues with Free and Open-Source Software for Privacy Tools</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/using-virtual-private-networks-vpn-and-tor-together"><strong><span style="color: #e03e2d;">Using Virtual Private Networks (VPN) and Tor Together</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/advanced-password-management-and-storage"><strong><span style="color: #e03e2d;">Advanced Password Management and Storage</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/advanced-encryption-chapter"><strong><span style="color: #e03e2d;">Advanced Encryption Chapter</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/acceptable-places-to-communicate-securely-with-another-party"><strong><span style="color: #e03e2d;">Acceptable Places to Communicate Securely with Another Party</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/file-change-detection-or-integrity-monitoring-systems"><strong><span style="color: #e03e2d;">File-Change Detection or Integrity Monitoring Systems</span></strong></a></li>
<li><a href="https://www.privacytools.io/guides/emergency-preparedness-a-plan-for-worst-case-scenarios"><strong><span style="color: #e03e2d;">Emergency Preparedness: A Plan for Worst Case Scenarios</span></strong></a></li>
</ul>
</li>
</ul>
<h3>About the Authors</h3>
<p>Hello. My name is CryptoSeb or just Seb. Back in 2015, some online friends and I noticed a gap in the information being provided to people to better their knowledge of security, privacy, and anonymity in our ever-changing digital world. We could find papers, forum posts, and discussion around little bits and pieces but we had to do the searching ourselves and put it all together. It really wasn’t suitable for like 75% of the Internet population. So in early 2016, I had this idea of writing a paper that would encompass everything related to security, privacy, and anonymity but tailor it to all walks of Internet users; whether that is my 59-year-old grandma, or Edward Snowden like individuals. This paper, titled “The Crypto Paper” resembles the beginning of my alias because it largely a collection of my own personal thoughts, knowledge, and experiences. As well, this paper is not going to be something that strikes every individual in a good spot 100% of the time – you WILL disagree with some of what is included and that is perfectly fine. We encourage you to submit corrections or give suggestions on how we can improve it.</p>
<p dir="auto"><strong>Bitmarauder</strong> As a cypherpunk and wanderer on these here wires, from time to time you will find that my hands feel the need make note of what I've learned in my travels in search for truth and freedom. By trade/study I work in infosec. My anonymity and privacy when necessary are huge.</p>
<p dir="auto"><strong>Reviewing / Content Editing</strong><br>Originally, I had these high hopes for this paper to get peer-reviewed by some big(ger) name people in the privacy/security industry and even though many of them agreed to take on the task, lives are busy and the paper is 61 pages. So I am just going to have to settle with a little more harsh criticism from the public. I know there has to be places in here where I am dead wrong or you think I should add/take out something so I encourage you to really speak up if you see the need. I intend on publishing an edited version 1-2 months from the initial release.</p>
<p dir="auto"><em>Note: Contact information of the authors removed since they've decided to take the paper offline.</em></p>
<p dir="auto"><em></em></p>
<h3 dir="auto">Reasons Behind The CryptoPaper</h3>
<p dir="auto">Back in mid 2015, I (among other friends) started to see a real issue with the people using the Internet. Not only were they using it completely incorrectly on so many different levels, but they didn’t have the resources to acquire accurate knowledge and change their behaviors. It isn’t necessarily the fact that people want to use the Internet incorrectly, it’s just that we have come from Windows 95, 50 pound desktop computers, 512mb of RAM, and Minesweeper, to petabyte servers, Google, self-driving cars, and ransomware in the course of 16 years. We have made technological leaps forward and it is literally consuming the massive portion of the population who weren’t born/raised in this era or who don’t have an interest in becoming “tech-savvy”. And yes, consuming is the right word. I swear if a computer could eat you, some of the 65-year-old people trying to text their grandchildren would be gone. That phone would have a mental break down as they ‘attempt’ to use it correctly and just eat them.</p>
<p dir="auto">But I have nothing against people who cannot seem to understand the security/privacy/anonymity aspects revolving around technology. That is actually the reason for this paper being developed in the first place. I want all my grandmas to be successful Internet users and not have to approach it with such a disconnect. Furthermore, we want avid tech people to also find a benefit and learn a little as well.</p>
<p dir="auto"><strong>Uniquely Designed</strong></p>
<p dir="auto">Designing something of this magnitude wasn’t as easy as you would think. I needed a way to separate the content so it had some sort of “flow” to it. But I also needed it to be something that wouldn’t lose the less experienced people right off the start. The idea I came up with was the split it into four categories of people:</p>
<ul dir="auto">
<li>Common Internet Folk</li>
<li>Business & Tech Geeks</li>
<li>Government Level Individuals</li>
<li>Edward Snowden?</li>
</ul>
<p dir="auto">As you move up from one category to the next, the information becomes more intensive and techy. I hope that this method ensures adequate learning on behalf of ALL Internet individuals and we definitely encourage you to learn in the sections where you are lost. This is meant to be a tool of knowledge to promote your learning!</p>
<h3 dir="auto">Conclusion</h3>
<p dir="auto">Finally, I am able to say that The Crypto Paper is complete! It is a huge achievement for me to say that. Writing this paper has taken countless hours, lots of research, and one too many discussions with people who have more knowledge and experience than myself. One of the older fellows that I have nightly coffee with made a comment to me that it was nearly impossible for him to keep up with the advancements we are making in technology and the way he talked about it, it was almost like he was just trying to stay afloat. This hit me as rather concerning. If we are moving this fast into a digitized world, where will my parents be in 5, 10, 20 years time? Would they be able to keep up? Or would they feel just as helpless? I got a lot of the inspiration for writing this paper from the amount of people I talk to who have zero clue how to keep up, stay secure, and even properly run a business in our Internet world today. But because I have been involved in, and always really interested in learning about security, privacy, and anonymity, I wasn’t just going to stop with the basics. I have had a fair amount of previous experience with the areas covered in this paper. So I figured it would be a great challenge to take on and I definitely had fun.</p>
<p dir="auto">Even if you were only able to get through the first category/section before being completely lost, I hope you were able to take something away from The Crypto Paper. And if you made it all the way to the end and had some concerns with things I have written about or views that I have, I encourage you to get in touch and discuss them with me. I mentioned in the introduction that this is largely a construction of the experiences and knowledge I have had and acquired over the last few years being a part of this “scene” so I know it will definitely not be perfect. Everyone who is well versed in these fields will have their own views on the topics discussed and many will have a lot more knowledge than myself. So if you are one of these individuals, please don’t be shy. Out of all of this, I want it to be a learning tool for not only those reading, but also myself. I will work on and improve this paper as I have time and as I receive criticisms and suggestions.</p>
<p dir="auto">Please feel free to contact either of us with any and all concerns, questions, or feedback. We look forward to hearing from you! <strong>Official Subreddit:</strong> <a href="https://reddit.com/r/cryptopaper" rel="nofollow">https://reddit.com/r/cryptopaper</a></p>
<p dir="auto">Thanks so much for reading. I encourage you to link to this paper, print it off, share it in any way you see fit. Just please do not alter the paper in a way that would discredit the many hours I have put into developing and writing it and the many hours others have spent reviewing it before it went public.</p>
<p dir="auto">Seb</p>
<p dir="auto"></p>Sun, 27 Mar 2022 13:53:11 +07003b018459304931a62eff3cefcbbc2bd3Smart Devices: Accepted Tracking for Convenience?
https://www.privacytools.io/guides/smart-devices-accepted-tracking-for-convenience
<p>You got it; your smartphone is an advanced spying/tracking device that:Thu, 24 Mar 2022 11:54:38 +0700a9bc7c3dd28fc88c9f1c9fc762653690Tracking: Your Operating Systems and Apps telemetry services
https://www.privacytools.io/guides/tracking-your-operating-systems-and-apps-telemetry-services
<p>Whether it is Android, iOS, Windows, macOS, or even Ubuntu. Most popular Operating Systems now collect telemetry information by default even if you never opt-in or opted-out from the start.Thu, 24 Mar 2022 11:49:24 +0700fd7fb6c8b73be540a27a7b9ab8eacc30Here is how even your CPU can be used to track you
https://www.privacytools.io/guides/here-is-how-even-your-cpu-can-be-used-to-track-you
<p>All modern CPUs are now integrating hidden management platforms such as the now infamous Intel Management Engine<sup id="fnref:103" role="doc-noteref"></sup> and the AMD Platform Security Processor.Thu, 24 Mar 2022 11:44:20 +0700fe7ff9545e05e98c8ea3b4c57cfb36c1You can be tracked via your Bluetooth MAC address
https://www.privacytools.io/guides/you-can-be-tracked-via-your-bluetooth-mac-address
<p>Your Bluetooth MAC is like the earlier MAC address except it is for Bluetooth.Thu, 24 Mar 2022 11:41:55 +07004a69c2865752326e005956da0b078bd1You can be tracked via your Wi-Fi or Ethernet MAC address
https://www.privacytools.io/guides/you-can-be-tracked-via-your-wi-fi-or-ethernet-mac-address
<p>The MAC address<sup id="fnref:99" role="doc-noteref"></sup> is a unique identifier tied to your physical Network Interface (Wired Ethernet or Wi-Fi) and could of course be used to track you if it is not randomized.Thu, 24 Mar 2022 11:37:54 +070012fb6b1479ebb3e5a3376d5a72076e15You can be tracked via your IMEI, IMSI and by extension, your phone number
https://www.privacytools.io/guides/you-can-be-tracked-via-your-imei-imsi-and-by-extension-your-phone-number
<p>The IMEI (International Mobile Equipment Identity) and the IMSI (International Mobile Subscriber Identity<sup id="fnref:85" role="doc-noteref"></sup>) are unique numbers created by cell phone manufacturers and cell phone operators.Thu, 24 Mar 2022 11:32:25 +0700cfcb4195b7c74f21bce584fc0c8bc634Devices can be tracked even when offline and invade your privacy
https://www.privacytools.io/guides/devices-can-be-tracked-even-when-offline-and-invade-your-privacy
<p>You have seen this in action/spy/Sci-Fi movies and shows, the protagonists always remove the battery of their phones to make sure it cannot be used.Thu, 24 Mar 2022 11:26:50 +0700193cf84fdfb60c0edd8825720df3ba3aHow to Counteract Forensic Linguistics
https://www.privacytools.io/guides/how-to-counteract-forensic-linguistics
<p>Stylometry is our personal and unique writing style. No matter who you are, you have a unique finger printable, and traceable writing style.Thu, 24 Mar 2022 09:01:47 +0700aa1fe97c91fec0f7065a039596d79a35Tracking your digital fingerprint, footprint and online behavior
https://www.privacytools.io/guides/tracking-your-digital-fingerprint-footprint-and-online-behavior
<p>This is the part where you should watch the documentary “The Social Dilemma”<sup id="fnref:143" role="doc-noteref"></sup> on Netflix.Thu, 24 Mar 2022 08:51:51 +070089e193a8550cd970806f065a4be6a30dHow your anonymized Tor/VPN traffic can be used to track you down
https://www.privacytools.io/guides/how-your-anonymized-tor-vpn-traffic-can-be-used-to-track-you-do
<p>Tor and VPNs are not silver bullets. Many advanced techniques have been developed and studied to de-anonymize encrypted Tor traffic over the years<sup id="fnref:68" role="doc-noteref"></sup>.Thu, 24 Mar 2022 08:45:02 +070025cbaa7159841a7bd314474b1a054c04Man-in-the-middle attacks with malicious & rogue Wi-Fi access points
https://www.privacytools.io/guides/man-in-the-middle-attacks-with-malicious-rogue-wi-fi-access-points
<p>These have been used at least since 2008 using an attack called “Jasager” and can be done by anyone using self-built tools or using commercially available devices such as Wi-Fi Pineapple<sup id="fnref:65" role="doc-noteref"></sup>.Thu, 24 Mar 2022 08:39:01 +0700ad4211ddfa7a487e6089603a916d31b7Geolocation: How Wi-Fi and Bluetooth devices track you
https://www.privacytools.io/guides/geolocation-how-wi-fi-and-bluetooth-devices-track-you
<p>Geolocation is not only done by using mobile antennas triangulation. It is also done using the Wi-Fi and Bluetooth devices around you. Thu, 24 Mar 2022 08:35:49 +07001eb9b9165bf35acce87c53cfaffe1e29Warning about smartphones and smart devices
https://www.privacytools.io/guides/warning-about-smartphones-and-smart-devices
<p>When conducting sensitive activities, remember that:Thu, 24 Mar 2022 08:30:28 +07008a46d6204f871db06cf364bdd4f2a61cHow your RFID enabled devices is tracking you
https://www.privacytools.io/guides/how-your-rfid-enabled-devices-is-tracking-you
<p>RFID stands for Radio-frequency identification, it is the technology used for instance for contactless payments and various identification systems.Thu, 24 Mar 2022 08:24:10 +07003c31a3340b0ffd435d57b518c73cb6dbVirtualization: Three big reasons how Virtual Machines can help to improve your privacy
https://www.privacytools.io/guides/virtualization-three-big-reasons-how-virtual-machines-can-help-to-improve-your-privacy
<p>Basically, it is like the Inception movie with computers. You have emulated software computers called Virtual Machines running on a physical computer.Thu, 24 Mar 2022 08:18:41 +07000d602b1211ebd8b0d75f7b54ae24d34fHow DNS and IP requests can be used to track you and how to avoid it
https://www.privacytools.io/guides/how-dns-and-ip-requests-can-be-used-to-track-you-and-how-to-avoid-it
<p>DNS stands for “Domain Name System” and is a service used by your browser (and other apps) to find the IP addresses of a service.Thu, 24 Mar 2022 08:08:11 +07000a6bbd194e19624ae1c59592b3db12f8How your public IP address can lead back to you. Use these IP tools to find out what is exposed
https://www.privacytools.io/guides/how-your-public-ip-address-can-lead-back-to-you
<p>Your IP address is the most known and obvious way you can be tracked. That IP is the IP you are using at the source. This is where you connect to the internet.Thu, 24 Mar 2022 07:37:57 +0700c30fff8db1ec23976eabe7985620ed10Finding safe places with decent public Wi-Fi for better privacy
https://www.privacytools.io/guides/finding-safe-places-with-decent-public-wi-fi-for-better-privacy
<p>You need to find safe places where you will be able to do your sensitive activities using some publicly accessible Wi-Fi (without any account/ID registration, avoid CCTVs).Wed, 23 Mar 2022 22:33:02 +0700cbd135033e0e03deef37c814e7817e59Using long-range Antenna to connect to Public Wi-Fis from a safe distance
https://www.privacytools.io/guides/using-long-range-antenna-to-connect-to-public-wi-fis-from-a-safe-distance
<p>It is possible to access/connect to remote distant Public Wi-Fis from a distance using a cheap directional Antenna that looks like this.</p>
<p>Wed, 23 Mar 2022 22:25:28 +0700fac36715cd84a6b1ade05b55a47f9a6cAccessing the internet as safely as possible when Tor and VPNs are not an option
https://www.privacytools.io/guides/accessing-the-internet-as-safely-as-possible-when-tor-and-vpns-are-not-an-option
<p>There might be worst-case situations where using Tor and VPNs are not possible due to extensive active censorship or blocking.</p>
<p>Wed, 23 Mar 2022 22:15:58 +070031f75b61caf0ea7b6a5df027277cab23Using Tor bridges in hostile environments
https://www.privacytools.io/guides/using-tor-bridges-in-hostile-environments
<p>In some environments, your ISPs might be trying to prevent you from accessing Tor. Or accessing Tor openly might be a safety risk.Wed, 23 Mar 2022 18:45:45 +0700fa88554c0dea3088d0bc5052ea8107c2Installing and using desktop Tor Browser
https://www.privacytools.io/guides/installing-and-using-desktop-tor-browser
<p>This is valid for Windows, Linux, and macOS.</p>
<ul>
<li><a href="https://www.privacytools.io/#browser" target="_blank" rel="noopener">Download and install Tor Browser</a></li>
<li>Open Tor Browser</li>
</ul>
<p>Wed, 23 Mar 2022 17:21:54 +0700506406bc90bd6d09ff5ff162f9d70a4b