Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
learn:how-tos [2019/04/24 11:00] – [VPN] 127.0.0.1 | learn:how-tos [2020/06/12 19:41] – [Guides to Crypto Tools] 127.0.0.1 | ||
---|---|---|---|
Line 11: | Line 11: | ||
====== Security warning ====== | ====== Security warning ====== | ||
- | Note however, that security is a process, not a tool. You need at least basic understanding to assess the degree of security or [[: | + | Note, however, that security is a process, not a tool. You need at least basic understanding to assess the degree of security or [[: |
- | The use of security sensitive activity (which is both prohibited and can be persecuted | + | All security sensitive activity (which is both prohibited, and persecutable |
Line 19: | Line 19: | ||
* [[: | * [[: | ||
* [[https:// | * [[https:// | ||
- | * [[http://www.tcij.org/resources/handbooks/infosec|Center for Investigative Journalism - Information Security for Journalists]] | + | * [[https://ssd.eff.org/en | Surveillance Self-Defense - Tips, Tools and How-tos for Safer Online Communications]] |
+ | * [[https://files.gendo.ch/ | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
Line 28: | Line 29: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
+ | * [[https:// | ||
====== Why is mass surveillance a problem? ====== | ====== Why is mass surveillance a problem? ====== | ||
Line 56: | Line 57: | ||
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
+ | * [[https:// | ||
===== Browser ===== | ===== Browser ===== | ||
- | [[https:// | + | [[https:// |
===== Tor Browser ===== | ===== Tor Browser ===== | ||
+ | Most possibly the best option you can and will ever have if you like your privacy, freedom and anonimity in your hands, and not in the hands of trackers, companies -like your personal ISP-, governmental systems and programs, and other potential snoopers, where they don't belong. | ||
* [[https:// | * [[https:// | ||
* Install & [[https:// | * Install & [[https:// | ||
Line 139: | Line 142: | ||
* Use antivirus software and a firewall. Do regular scans & updates | * Use antivirus software and a firewall. Do regular scans & updates | ||
* Regularly update all of the software you find on this page | * Regularly update all of the software you find on this page | ||
+ | * Check if you have an account that has been compromised in a data breach on [[https:// | ||
Line 769: | Line 773: | ||
Make sure that.. | Make sure that.. | ||
- | * …you pay for the VPN (don't use free ones, [https:// | + | * …you pay for the VPN (don't use free ones, [[https:// |
* …you do the above anonymously (ie using [[: | * …you do the above anonymously (ie using [[: | ||
- | * …the VPN [[https:// | + | * …the VPN [[https:// |
* …the VPN doesn' | * …the VPN doesn' | ||
* …you can also install your own VPN [[https:// | * …you can also install your own VPN [[https:// | ||
Line 850: | Line 854: | ||
===== Web Browsing ===== | ===== Web Browsing ===== | ||
- | * [[https:// | + | * [[https:// |
- | * [[https:// | + | |
===== Chat ===== | ===== Chat ===== |