Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
learn:how-tos [2019/05/24 18:33]
127.0.0.1 old revision restored (2019/04/24 11:01)
learn:how-tos [2020/05/08 09:51]
127.0.0.1 old revision restored (2020/02/16 23:07)
Line 11: Line 11:
 ====== Security warning ====== ====== Security warning ======
  
-Note however, that security is a process, not a tool. You need at least basic understanding to assess the degree of security or [[:connect:resources#why_there_is_no_100_anonymity|anonymity]] a tool can give you. That said, treat it like a game. The worst thing which can happen if you use these tools for your everyday business is that you are just as unsecure, unencrypted or in the open as you would be anyway.+Notehowever, that security is a process, not a tool. You need at least basic understanding to assess the degree of security or [[:connect:resources#why_there_is_no_100_anonymity|anonymity]] a tool can give you. That said, treat it like a game. The worst thing which can happenif you use these tools for your everyday businessis that you are just as unsecure, unencrypted or in the open as you would be anyway.
  
 The use of security sensitive activity (which is both prohibited and can be persecuted by society and/or government) without deep understanding is **strongly** discouraged. The use of security sensitive activity (which is both prohibited and can be persecuted by society and/or government) without deep understanding is **strongly** discouraged.
Line 20: Line 20:
   * [[https://securityinabox.org/|Tactical Technology Collective - Security-in-a-Box]]   * [[https://securityinabox.org/|Tactical Technology Collective - Security-in-a-Box]]
   * [[http://www.tcij.org/resources/handbooks/infosec|Center for Investigative Journalism - Information Security for Journalists]]   * [[http://www.tcij.org/resources/handbooks/infosec|Center for Investigative Journalism - Information Security for Journalists]]
 +  * [[https://ssd.eff.org/en | Surveillance Self-Defense - Tips, Tools and How-tos for Safer Online Communications]]
   * [[https://flossmanuals.net/an-open-web/|FLOSS Manuals - An Open Web]]   * [[https://flossmanuals.net/an-open-web/|FLOSS Manuals - An Open Web]]
   * [[https://www.privacytools.io/|Privacy Tools]]   * [[https://www.privacytools.io/|Privacy Tools]]
Line 28: Line 29:
   * [[https://alternatives.tacticaltech.org/|https://alternatives.tacticaltech.org/]]   * [[https://alternatives.tacticaltech.org/|https://alternatives.tacticaltech.org/]]
   * [[https://github.com/redecentralize/alternative-internet|https://github.com/redecentralize/alternative-internet]]   * [[https://github.com/redecentralize/alternative-internet|https://github.com/redecentralize/alternative-internet]]
 +  * [[https://switching.software/|https://switching.software/]]
 ====== Why is mass surveillance a problem? ====== ====== Why is mass surveillance a problem? ======
  
Line 56: Line 57:
   * [[http://smart-ip.net/geoip|http://smart-ip.net/geoip]]   * [[http://smart-ip.net/geoip|http://smart-ip.net/geoip]]
   * [[https://panopticlick.eff.org|https://panopticlick.eff.org]]   * [[https://panopticlick.eff.org|https://panopticlick.eff.org]]
 +  * [[https://webkay.robinlinus.com/]]
  
 ===== Browser ===== ===== Browser =====
  
-[[https://www.mozilla.org/en-US/firefox/|Firefox]] is an open source web browser that respects your privacy. If you're not using it already you should do from now on. It's as good as Chrome, fast and the most extendable browser with most AddOns. It's available for Windows, Mac & Linux.+[[https://www.mozilla.org/en-US/firefox/|Firefox]] is an open source web browser that respects your privacy. If you're not using it already you should do so from now on. It's as good as Chrome, fast and the most extendable browser with most AddOns. It's available for Windows, Mac & Linux.
  
 ===== Tor Browser ===== ===== Tor Browser =====
  
 +Most possibly the best option you can and will ever have if you like your privacy, freedom and anonimity in your hands, and not in the hands of trackers, companies -like your personal ISP-, governmental systems and programs, and other potential snoopers, where they don't belong.
   * [[https://www.torproject.org/download/download-easy.html.en|Download the Tor Browser]]   * [[https://www.torproject.org/download/download-easy.html.en|Download the Tor Browser]]
   * Install & [[https://www.torproject.org/download/download-easy.html.en#warning|read the warning]]   * Install & [[https://www.torproject.org/download/download-easy.html.en#warning|read the warning]]
Line 139: Line 142:
   * Use antivirus software and a firewall. Do regular scans & updates   * Use antivirus software and a firewall. Do regular scans & updates
   * Regularly update all of the software you find on this page   * Regularly update all of the software you find on this page
 +  * Check if you have an account that has been compromised in a data breach on [[https://haveibeenpwned.com/|HaveIBeenPwned.com]]
  
  
Line 850: Line 854:
 ===== Web Browsing ===== ===== Web Browsing =====
  
-  * [[https://itunes.apple.com/us/app/ghostery/id472789016|Ghostery]] stops third-party sites from tracking you. + * [[https://itunes.apple.com/au/app/onion-browser/id519296448?mt=8|Onion browser]] is a Tor-capable web browser that lets you access the internet privately and anonymously.
-  * [[https://itunes.apple.com/au/app/onion-browser/id519296448?mt=8|Onion browser]] is a Tor-capable web browser that lets you access the internet privately and anonymously.+
  
 ===== Chat ===== ===== Chat =====