background preloader

Secure Mobile Apps – Guardian Project

Secure Mobile Apps – Guardian Project
To achieve our goal of a comprehensive, privacy- and security-focused communications solution, Guardian is driven both by internal development and the open-source community at large. In cases where a viable, vetted, and usable product already fills the communications needs of our target audience, we will recommend apps that work. Our Apps Our apps are available on Google Play, Apple App Store, our F-Droid Repository, or download the APK directly from us. Expert users can also download and test our nightly builds. Orbot: Proxy With Tor Orbot brings the capabilities of Tor to Android. Orfox: Browser for Orbot Orfox is built from the same source code as Tor Browser (which is built upon Firefox), but with a few minor modifications to the privacy enhancing features to make them compatible with Firefox for Android and the Android operating system.Google Play | F-Droid | Learn More ObscuraCam: The Privacy Camera A secure camera app that can obscure and redact pixels within an image. Related:  Internet, Tips & Tricks9.2.5.3. Web protection tools

Ce petit outil vous permet de savoir ce que Facebook pense reconnaître sur vos photos Vous ne le saviez peut-être pas, mais à chaque fois que vous publiez une photo sur Facebook, le site l’analyse et essaie de deviner ce qui se cache derrière. Cette technique est notamment pratique pour les personnes malvoyantes ou aveugles, afin qu’elles puissent savoir ce que vous venez de partager. Mais elle montre aussi à quel point Facebook est bon quand il s’agit de créer des algorithmes permettant d’analyser une photo et d’expliquer ce qui se trouve dessus. Pour que tout le monde puisse s’en rendre compte, Adam Geitgey, un développeur californien, a créé une extension Chrome et Firefox que vous pouvez installer sur votre navigateur, explique The Next Web.

5 "DISPOSABLE" Web Accounts to Keep Your Identity Safe Identity theft is on the rise. According to StatisticBrain, there are between 12 and 15 million victims every year with an average loss of about $5,000 per victim. What would you do if you were next? There are so many different ways your identity can be stolen these days. Social security numbers and banking PINs are the obvious methods, but here are a few other methods you may not be aware of: You can’t be in 100% control over all of these potential attack vectors, but it’s in your best interest to cover your tracks as much as possible. In 2014, a SWAT team busted into the house of a well-known gaming streamer (named Kootra) when one of his watchers phoned in a prank claiming that he was holding people hostage. In the most recent election, Trump supporters on social media were heavily “doxed” — their real-life personal details were discovered and released to the public, opening the door for others to abuse that information however they saw fit. 2. Google Voice is also an option. 3. 4. 5.

Mobilitics Home Well, it's probably right there in your pocket, if you own a smartphone and carry it with you. In order to evaluate the actual privacy risks of smartphones and to raise public awareness of these risks, the CNIL (French data protection authority) and the Inria (French public science and technology institution dedicated to computational sciences) Privatics team started working together in 2012 as part of the Mobilitics project. Know more about Mobilitics iOS6PrivacyExtension Demo Video Apple made a descent step towards making their iOS privacy-friendly by introducing new privacy-specific settings in iOS 6. Know more » iOS5.1LiveExperiment We've developed a software solution for iOS 5.1 to capture access to private information by various Apps. Know more » Android4.1Logger Android Logger runs on Android 4.1 and captures events where phone accesses a particular kind of private data and sends it to the network. Know more »

Plagiat : 3 outils gratuits pour repérer les copiés-collés Duplicate Content de Positeo ​ C'est bien aux voleurs de contenus qu'a décidé de s'attaquer Positeo en créant Duplicate Content en 2010. Certes, l'outil a dû essuyer quelques bugs l'an dernier, notamment lorsque Google a changé l'API permettant de récupérer son contenu. Concrètement, deux choix s'offrent à vous : entrer le texte que vous souhaitez vérifier, ou tout simplement coller l'URL de la page à analyser. PlagSpotter ​ PlagSpotter s'enorgueillit de répondre chaque jour à plus de 10 000 requêtes pour 1 200 utilisateurs. L'autre avantage de PlagSpotter est sa version premium. Pixsy ​ Du côté de Pixsy, ce sont les internautes utilisant des images sans licence que l'on traque grâce à une sorte de moteur de recherche inversé permettant à chacun de retrouver gratuitement ses photos, dessins et autres oeuvres d'art sur le web. La création d'un compte sur la plateforme est indispensable pour tester l'outil.

Snowden-approved: The ‘Citizenfour’ hacker’s toolkit One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs. The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, we’ve put together a guide to some of the major security software programs and operating systems available. If you’ve wanted to take steps to secure your own information, but were uncertain where to start, this article should get you headed in the right direction. Browser Security: Tor The Tor Security Bundle is probably the best-known of the software products we’ll discuss today. Configuring Tor is relatively easy. Make your choice, and the system finishes installing what looks like a standard version of Firefox with a few custom scripts and configuration options. Alternatives: There really aren’t any.

Comment protéger sa vie privée sur Internet » Privatics De récentes révélations ont mis en évidence des programmes de surveillance à grande échelle. Nous présentons ici un guide permettant aux utilisateurs soucieux de leur vie privée de se prémunir des menaces qui pèsent sur leurs informations personnelles. Ce guide se présente sous la forme d’une liste d’outils logiciels ou services qui permettent d’empêcher ou de limiter la collecte d’information personnelles lors de leurs activités dans le monde numérique. La liste suivante contient un ensemble d’outils qui permettent de protéger notre vie privée. Moteur de recherche La plupart des moteurs de recherche collectent des informations sur leurs utilisateurs (mots clefs, adresse IP). Navigateur Web Lorsque vous naviguez le web, les pages que vous affichez sont enregistrés par les sites que vous visitez, mais aussi par des entités tierces. AdBlock pour Chrome et Adblock Plus pour FirefoxFlashBlock pour Chrome ou FirefoxDisconnect pour Chrome et Firefox HTTPS Everywhere pour Firefox et Chrome

Sodaphonic: un editeur audio en ligne et sans inscription Que demander de plus qu’un éditeur en ligne sans publicité, sans inscription, sans flash. He bien voici venu Sodaphonic qui est tout cela à la fois. Rien de bien révolutionnaire mais très pratique car utilisable sur tous vos appareils sans problèmes. Dès l’accueil, le choix vous est laissé entre enregistrer directement avec votre micro ou envoyer un fichier au format mp3. Par la suite, cela ressemble à n’importe quel éditeur audio. Vous pouvez alors couper des morceaux, les recoller selon vos envies. La solution est gratuite, sans publicité et ne nécessite aucune inscription. Lien: Sodaphonic

Privacy tools You are being watched. It has become a fact that private and state sponsored organizations are spying on us. is here to give you the knowledge and tools to defend yourself against global mass surveillance. Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. example search: edward snowden is our new privacy-respecting and highly customizable search engine with excellent results. it's open source and doesn't have ads, logs or tracking. All providers listed here are operating outside the USA, accepting Bitcoin and supporting OpenVPN. Note: Using a VPN provider will not make you anonymous. Our VPN Provider Criteria We're not affiliated with any of the above listed VPN providers. Related VPN information Warrant Canary Examples: 1.

Guide d’autodéfense numérique