background preloader

EPIC Online Guide to Practical Privacy Tools

EPIC Online Guide to Practical Privacy Tools
Disclaimer: EPIC does not lobby for, consult, or advise companies, nor do we endorse specific products or services. This list merely serves as a sampling of available privacy-enhancing tools. If you have a suggestion for a tool that you believe should be included, or if you have comments to share regarding one or more of the tools that are already listed, send e-mail to epic-info@epic.org. If you have questions about a tool on this page, visit the affiliated company or individual's Web site for more information. CD/USB Based Operating Systems Tails: live operating system that can run from removable media without leaving tracks. Internet Anonymizers, Virtual Private Networks (VPNs) and Proxy Servers Web Browser Ad-ons HTTPS Everywhere (Firefox, Chrome): forces HTTPS versions of websites were they are available. Search Engines DuckDuckGo: anonymous, encrypted web searches. ixquick: anonymous, encrypted web searches. Email/Communication Encryption Alternative Email Accounts Anonymous Remailers

http://epic.org/privacy/tools.html

Related:  technologysecurity & privacyWeb PrivacyOnline Privacy ToolsPrivacy

How to Surf the Web Anonymously& The Internet has a way of lulling you into a false sense of anonymity. After all, how can anyone know your true identity in a virtual world? The truth is that simply by connecting to the Internet, you share information about your computer, your geographical location and even about the Web sites you visit. How to Avoid Identity Theft Identity Theft is one of the worst things that can happen to your personal finances. When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. How to Avoid Identity Theft Online Shredding statements is always a good idea The Federal Trade Commission maintains an Identity Theft Awareness website that outlines three important steps for avoiding identity theft: Deter Identity Theft, Detect Identity Theft, and Defend Against Identity Theft.

Why you should stay away from Unseen.is - joepie91's Ramblings It took a bit longer than I expected before I had the time to make this post, but here it finally is. Not too long ago, I ran across some Anonymous-related Twitter accounts promoting Unseen.is. Unseen is, in their own words, a "private and secure messaging, calling and e-mail application" - which seems great, but really isn't.

Aerogel: See-Through, Strong as Steel & Ligher than Air Despite its incredibly low density, aerogel is one of the most powerful materials on the planet. It can support thousands of times its own weight, block out intense heat, cold and sound – yet it is 1,000 times less dense than glass, nearly as transparent and is composed of %99.8 air. The lowest-density silica-based aerogels are even lighter than air. Despite its fragility in certain regards and its incredible lack of density, aerogel has amazing thermal, acoustical and electrical insulation properties as illustrated by the images here. A single one-pound block can also support half a ton of weight.

Legal Help Removing Content From Google This page will help you get to the right place to report content that you would like removed from Google's services under applicable laws. Providing us with complete information will help us investigate your inquiry. Secure Digital Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). SD technologies have been implemented in more than 400 brands across dozens of product categories and more than 8,000 models.[1] The Secure Digital format includes four card families available in three different form factors.

What Is Deep Packet Inspection? It’s easy to turn a deaf ear to the controversy surrounding recent copyright protection bills like the Stop Online Piracy Act (SOPA) or the PROTECT IP Act, which threatened to curtail free speech on the Internet by allowing the U.S. Department of Justice to blacklist and block access to websites suspected of copyright infringement. Most of us don’t visit websites suspected of illegally distributing copyrighted material, so blocking us from accessing them seems harmless. But should your ISP ever be legally obligated to prevent you from accessing restricted websites, it will have to find a way to monitor your online activity, and that could cause your privacy to be compromised if your ISP employs deep packet inspection tools to keep tabs on you.

PET - CyberWiki Thanks for visiting the CIS PET wiki. This is meant to be a list of free technologies aimed at empowering Internet users to gain better control over their data. It's very simple to add an entry---just click the "edit" tab, copy and paste the previous entry, and substitute the name, description, and address. Abine - A Firefox / Internet Explorer plugin that blocks third party advertising networks, manages HTTP, DOM, and Flash cookies, and securely manages site logins. Currently in private beta, but invites aren't hard to get. Abine Privacy SuiteAd Blockers for Browsers - Firefox: Adblock Plus Chrome: AdBlock Safari: AdBlock Anon email services - Send anonymous email awxcnx.de Email drop drop.ioAnonymouse - A Web search portal hosted on an island off the coast of Somalia.

Related: