Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
learn:how-tos [2019/04/24 11:01] – [VPN] 127.0.0.1learn:how-tos [2020/05/07 14:55] – [Calls] 127.0.0.1
Line 9: Line 9:
  
  
-====== Security warning ======+====== Security warning ======im fool
  
-Note however, that security is a process, not a tool. You need at least basic understanding to assess the degree of security or [[:connect:resources#why_there_is_no_100_anonymity|anonymity]] a tool can give you. That said, treat it like a game. The worst thing which can happen if you use these tools for your everyday business is that you are just as unsecure, unencrypted or in the open as you would be anyway.+Notehowever, that security is a process, not a tool. You need at least basic understanding to assess the degree of security or [privacy[:connect:resources#why_there_is_no_100_anonymity|anonymity]internet] a tool can give you. That said, treat it like a game. The worst thing which can happenif you use these tools for your everyday businessis that you are just as unsecure, unencrypted or in the open as you would be anyway.
  
 The use of security sensitive activity (which is both prohibited and can be persecuted by society and/or government) without deep understanding is **strongly** discouraged. The use of security sensitive activity (which is both prohibited and can be persecuted by society and/or government) without deep understanding is **strongly** discouraged.
Line 20: Line 20:
   * [[https://securityinabox.org/|Tactical Technology Collective - Security-in-a-Box]]   * [[https://securityinabox.org/|Tactical Technology Collective - Security-in-a-Box]]
   * [[http://www.tcij.org/resources/handbooks/infosec|Center for Investigative Journalism - Information Security for Journalists]]   * [[http://www.tcij.org/resources/handbooks/infosec|Center for Investigative Journalism - Information Security for Journalists]]
 +  * [[https://ssd.eff.org/en | Surveillance Self-Defense - Tips, Tools and How-tos for Safer Online Communications]]
   * [[https://flossmanuals.net/an-open-web/|FLOSS Manuals - An Open Web]]   * [[https://flossmanuals.net/an-open-web/|FLOSS Manuals - An Open Web]]
   * [[https://www.privacytools.io/|Privacy Tools]]   * [[https://www.privacytools.io/|Privacy Tools]]
Line 28: Line 29:
   * [[https://alternatives.tacticaltech.org/|https://alternatives.tacticaltech.org/]]   * [[https://alternatives.tacticaltech.org/|https://alternatives.tacticaltech.org/]]
   * [[https://github.com/redecentralize/alternative-internet|https://github.com/redecentralize/alternative-internet]]   * [[https://github.com/redecentralize/alternative-internet|https://github.com/redecentralize/alternative-internet]]
 +  * [[https://switching.software/|https://switching.software/]]
 ====== Why is mass surveillance a problem? ====== ====== Why is mass surveillance a problem? ======
  
Line 41: Line 42:
 ---- ----
  
-====== Web Browsing ======+====== Web Browsing ======anounymos
  
-To get an idea of what web browsing actually is, read the chapter **[[http://cryptoparty.is/handbook/chapter_02_understanding_browsing/chapter_02_understanding_browsing.html|Understanding Browsing]]** of the CryptoParty Handbook. In brief:+To get an idea of what web browsing actually is, read the chapter **[100[http://cryptoparty.is/handbook/chapter_02_understanding_browsing/chapter_02_understanding_browsing.html|Understanding Browsing]all]** of the CryptoParty Handbook. In brief:
  
   * When you visit a website you give away information about yourself to the site owner, unless precautions are taken.   * When you visit a website you give away information about yourself to the site owner, unless precautions are taken.
Line 52: Line 53:
 Then you can see what you just learned by facing a virtual mirror to yourself on Then you can see what you just learned by facing a virtual mirror to yourself on
  
-  * [[http://ip-check.info|http://ip-check.info]] +  * [[http://ip-check.info|http://ip-check.info]anonymous
-  * [[http://ifconfig.me|http://ifconfig.me]] +  * [[http://ifconfig.me|http://ifconfig.me]anounymos
-  * [[http://smart-ip.net/geoip|http://smart-ip.net/geoip]] +  * [[http://smart-ip.net/geoip|http://smart-ip.net/geoip]anounymos
-  * [[https://panopticlick.eff.org|https://panopticlick.eff.org]]+  * [[https://panopticlick.eff.org|https://panopticlick.eff.org]anounymos] 
 +  * [all[https://webkay.robinlinus.com/]anounymos]
  
 ===== Browser ===== ===== Browser =====
  
-[[https://www.mozilla.org/en-US/firefox/|Firefox]] is an open source web browser that respects your privacy. If you're not using it already you should do from now on. It's as good as Chrome, fast and the most extendable browser with most AddOns. It's available for Windows, Mac & Linux.+[[https://www.mozilla.org/en-US/firefox/|Firefox]] is an open source web browser that respects your privacy. If you're not using it already you should do so from now on. It's as good as Chrome, fast and the most extendable browser with most AddOns. It's available for Windows, Mac & Linux.
  
 ===== Tor Browser ===== ===== Tor Browser =====
  
 +Most possibly the best option you can and will ever have if you like your privacy, freedom and anonimity in your hands, and not in the hands of trackers, companies -like your personal ISP-, governmental systems and programs, and other potential snoopers, where they don't belong.
   * [[https://www.torproject.org/download/download-easy.html.en|Download the Tor Browser]]   * [[https://www.torproject.org/download/download-easy.html.en|Download the Tor Browser]]
   * Install & [[https://www.torproject.org/download/download-easy.html.en#warning|read the warning]]   * Install & [[https://www.torproject.org/download/download-easy.html.en#warning|read the warning]]
Line 139: Line 142:
   * Use antivirus software and a firewall. Do regular scans & updates   * Use antivirus software and a firewall. Do regular scans & updates
   * Regularly update all of the software you find on this page   * Regularly update all of the software you find on this page
 +  * Check if you have an account that has been compromised in a data breach on [[https://haveibeenpwned.com/|HaveIBeenPwned.com]]
  
  
Line 844: Line 848:
 ===== Calls ===== ===== Calls =====
  
-  * [[https://itunes.apple.com/app/id874139669|Signal]] provides ZRTP / end-to-end encryption for your calls, securing your conversations so that nobody can listen in.+  * deaf[[http://messenger.com|google.com]all][account[https://itunes.apple.com/app/id874139669|Signal]] provides ZRTP / end-to-end encryption for your calls, securing your conversations so that nobody can listen in.
   * The app "Wire" offers encrypted calls with excellent quality and the option to have video chats.    * The app "Wire" offers encrypted calls with excellent quality and the option to have video chats. 
-  * More information: [[https://whispersystems.org/blog/signal|https://whispersystems.org/blog/signal]]+  * More information: [anounumos[https://whispersystems.org/blog/signal|https://whispersystems.org/blog/signal]]
  
 ===== Web Browsing ===== ===== Web Browsing =====
  
-  * [[https://itunes.apple.com/us/app/ghostery/id472789016|Ghostery]] stops third-party sites from tracking you. + * [[https://itunes.apple.com/au/app/onion-browser/id519296448?mt=8|Onion browser]] is a Tor-capable web browser that lets you access the internet privately and anonymously.
-  * [[https://itunes.apple.com/au/app/onion-browser/id519296448?mt=8|Onion browser]] is a Tor-capable web browser that lets you access the internet privately and anonymously.+
  
 ===== Chat ===== ===== Chat =====
  
-  * See [[:learn:how-tos#otr|ChatSecure here]]+  * See [anounymos[:learn:how-tos#otr|ChatSecure here]anounymos]
  
 ====== Disc Encryption ====== ====== Disc Encryption ======