background preloader

Online Privacy Tools

Facebook Twitter

Domain information, whois & dns report.


Guide d’autodéfense numérique. Do not track. Surveillance Self-Defense. Anti-spy Find spyware and trojans. 'Uncrackable' codes set for step up. 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications.

'Uncrackable' codes set for step up

A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Details appear in Nature journal. The system is based on a communication system, where information is carried by individual photons - single particles of light. Once these single photons of light are observed, they change. Continue reading the main story Quantum key distribution. Privacy tools. You are being watched.

Privacy tools

It has become a fact that private and state sponsored organizations are spying on us. is here to give you the knowledge and tools to defend yourself against global mass surveillance. Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide. " I always say the same thing to them.

I get out a pen, I write down my email address. I say, "Here's my email address. Example search: edward snowden is our new privacy-respecting and highly customizable search engine with excellent results. it's open source and doesn't have ads, logs or tracking. All providers listed here are operating outside the USA, accepting Bitcoin and supporting OpenVPN. Hacker Attack Tools. Top 75 Network Security Tools. DeleteMe. Password Secrets of Popular Windows Applications.

Free (Anonymous) Proxy - moteurs de recherche anonymes.

Passwords: Why "This Is Fun" Is 10x Safer Than "J4fS!2" Find Your Own Private Internet With Freenet. PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world.

Find Your Own Private Internet With Freenet

Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication. Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network.

Next, head over to the Freenet Project website, and download the Freenet client for your operating system. DuckDuckGo en plein essor, le moteur de recherche anonyme franchit le cap du milliard de requêtes en 2013. 2013 a été une année hautement prolifique pour le moteur de recherche anonyme DuckDuckGo.

DuckDuckGo en plein essor, le moteur de recherche anonyme franchit le cap du milliard de requêtes en 2013

Lancé en 2008, DuckDuckGo se distingue par le respect de la vie privée des internautes et se positionne comme un concurrent direct du moteur Google. Le moteur de recherche utilise d’ailleurs le slogan « Google vous piste, pas nous », et avait effectué des enquêtes pour montrer qu’il n’existe plus de résultats standards sur Google. Non seulement DuckDuckGo propose des résultats pertinents et de qualité, mais il assure également la protection de la vie privée de l’internaute. Le moteur n’utilise pas de cookies, ne stocke pas l’adresse IP de l’utilisateur, ou toute autre information personnelle. Depuis son lancement, DuckDuckGo a entamé une croissance toute en douceur, jusqu’à mi-2013, où le trafic du moteur de recherche a littéralement doublé. Pourquoi cette hausse brusque ? Dans l’ensemble, DuckDuckGo a enregistré plus d’un milliard de requêtes en 2013, plus du double de son trafic en 2012.

Et vous ? Still trust DuckDuckGo? In my recent blog post PRISM - Where do we go from here?

Still trust DuckDuckGo?

I made the point that using services such as DuckDuckGo on the presumption that they are safe, is a dangerous thing to do and explained why. Google tracks you. We don't. An illustrated guide. DuckDuckGo does not collect or share personal information.

Google tracks you. We don't. An illustrated guide.

That is our privacy policy in a nutshell. The rest of this page tries to explain why you should care. Last updated on 04/11/12. Removed ", which gets sent to my personal email. " in last paragraph as our feedback is now handled by multiple team members via Before that, on 03/11/12. Telegram Messenger for iPhone and Android. Three steps to properly protect your personal data. With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly.

Three steps to properly protect your personal data

Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. It's fairly easy, quick, and free. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach:

Ghostzilla - the invisible browser. Secure Digital. Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers.

Secure Digital

The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). SD technologies have been implemented in more than 400 brands across dozens of product categories and more than 8,000 models.[1] The Secure Digital format includes four card families available in three different form factors. How to Avoid Identity Theft. Identity Theft is one of the worst things that can happen to your personal finances.

How to Avoid Identity Theft

When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. Online Guide to Practical Privacy Tools. Le véritable firewall Open Office. C'est Tenshy, fidèle lecteur de qui m'a envoyé cette news plutôt insolite : Le véritable firewall Openoffice !!!

Le véritable firewall Open Office

C'est le blogueur Pollux, qui a eu l'idée de spécifier dans une feuille calc (Open Office) les numéros des ports à filtrer, puis récupère les valeurs pour les filtrer grâce au module kernel nfqueue. La difficulté ici, c'est surtout de pouvoir lancer les commandes nfqueue en root, sans que Open Office ne soit lui-même lancé en root. Pollux a donc mis au point une couche de communication (XML-RPC) entre Oo et nfqueue, avec pyUNOserver. Ensuite avec Python-uno, il manipule OpenOffice et arrive à lui faire faire des graphiques en fonction de ce qui est vraiment filtré. Insect Pro. LogMeIn - Remote Access and Desktop Control Software for Your Computer. Nmap - Free Security Scanner For Network Exploration & Security Audits.

John the Ripper password cracker. John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance.

This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL. There are unofficial binary builds (by John the Ripper user community members) for Windows, Linux, Solaris, and Mac OS X.