background preloader

Keybase

Related:  Privacy Tools

Free Personal Information Manager (PIM) Software - Efficcess Remote Communication - LibrePlanet This list is work in progress. We have not audited the software listed on this page for security or privacy concerns beyond what developers of the software, and potentially other sites tell us about it. We have done some initial research into software licenses. Entries with Free Software Directory links have been thoroughly reviewed from a licensing perspective. This page is a shared resource, and we encourage others to add to it, so some of the entries here may be added by members of the community. As more people are going remote, there is an outbreak of proprietary software happening around the Internet. Join the RemoteCommunication mailing list to coordinate! Posts about this topic: The FSF is hosting its own freedom-respecting videoconferencing service. Video Real-time voice and video chat is an item on the FSF's High Priority Projects list. Audio Social Networking Text and possibly document sharing Publication

Kontact The Kontact suite is the powerful PIM solution of KDE that handles your email, agenda, contacts and other 'personal' data together in one place. Kontact delivers innovations to help you manage your communications more easily, organize your work faster and work together more closely, resulting in more productivity and efficiency in digital collaboration. Components KDE Kontact supports various groupware servers. When using these servers your workgroup has access to features like shared email folders, group task lists, calendar sharing, central address books and meeting scheduling. Kontact consists of the Kontact PIM back end and the graphical applications connecting to the back end. These programs together form Kontact: Akregator - Read your favorite feeds KAddressBook - Manage your contacts KMail - Mail client KNotes - Sticky notes for your Desktop KOrganizer - Calendar and scheduling, Journal Summary - Summary screen in Kontact KJots - Your ideas organized in a Notebook Where to get help

I created a reddit-like site that bridges I2P, Tor and Yggdrasil to allow users to interact with one another without leaving their network of choice. (Also available on the clearnet) : i2p I hope that it's okay that I post this here. So, I wanted a reddit-like site that was: Lightweight / fastPrivacy focusedNot heavy on censorshipAnd integrated with "alternative internets" (Tor, I2P, Yggdrasil for now) This website is accessible as a service on each of the individual large anonymity networks allowing users of those networks to not leave their network of choice. Originally I wasn't going to have a clearnet version, but decided that bridging everyone into one place may serve valuable in getting regular, every day people more interested in online privacy and supporters of these various alternative networks. Anyway, it has just literally launched. You can access the website via the following networks / urls: There is also an I2P community on [RAMBLE] here: and I encourage the mods from /r/i2p to join there and I'll grant you mod access to that forum as well since you do a great job here.

Feedbin The New Oil You’re probably already aware that cell phones don’t communicate directly with other cell phones, they communicate with cell towers who make a mesh network with other cell towers to bounce your call, text, or other data from tower to tower until it reaches its destination. But you may not know that the internet works in a similar fashion. In this section, I want to explain how modern digital communication works to help you understand how some of the tools and techniques in later sections protect your communications. Your Phone is a Radio Without getting too deep into the weeds, all wireless signals run on the electromagnetic spectrum. Wireless microphones, radios, cell phones, and even WiFi all falls under the “radio waves” section. Needless to say, your phone is pretty small, and trying to shoot out enough radio radiation to reach anywhere in the world would be extremely damaging to your health, and would require your phone to be literally massive, too big to be mobile. What is DNS?

The Hitchhiker’s Guide to Online Anonymity | thgtoa Version 0.1.1 (draft), December 2020 (work in progress, some parts are incomplete) by AnonymousPlanet This guide is open-source, licensed under Creative Commons Attribution 4.0 International (cc-by-4.0). Feel free to submit issues/recommendations/ideas using Github Issues at: PDF version of this guide at: Making a social media account with a pseudonym or artist/brand name is easy. And it’s enough is most use cases to protect your identity as the next George Orwell. This is a good thing as most criminals/trolls are not really tech savvy and will be identified with ease. This updated guide aims to provide introduction to various tracking techniques, id verification techniques and guidance to creating and maintaining anonymous identities online including social media accounts safely. You have to consider your threat model before going further. This guide is not intended for: Phishing:

Session | Send Messages, Not Metadata. | Private Messenger spantaleev/matrix-docker-ansible-deploy: Matrix (An open network for secure, decentralized communication) server setup using Ansible and Docker Installing the new Dendrite Matrix Homeserver on Debian Buster | Pieter Hollander This post contains my personal notes on how to set up Dendrite, Matrix.org’s second-generation homeserver written in Go. These notes are not yet complete, but do contain the basics to get things going. Please note that Dendrite is in early beta and not yet recommended for use in production environments. For more information, refer to the README.md on Github and this blogpost on Matrix.org. For more information on Dendrite, have a look at the official Dendrite documentation. This post assumes you are using a system running Debian, either on bare-metal, virtualised or in an LXC container. Setup apt, unattended-upgrades and dependencies Add Dendrite user sudo adduser \ --system \ --shell /bin/bash \ --gecos 'Dendrite' \ --group \ --disabled-password \ --home /opt/dendrite \ dendrite sudo -u postgres createuser -P dendrite for i in account device mediaapi syncapi roomserver signingkeyserver federationsender appservice e2ekey naffka; do sudo -u postgres createdb -O dendrite dendrite_$i done

Related: