Privacy Guide: Fight Surveillance with Encryption and Privacy Tools

Privacy Guide: Fight Surveillance with Encryption and Privacy Tools
Privacy Guide: Fight Surveillance with Encryption and Privacy Tools

Embark on a journey to safeguard your digital footprint. Discover the power of encryption and privacy tools in combating surveillance. Unearth the secrets of maintaining your privacy in an increasingly interconnected world.

Improve the privacy of your friends & family by sharing this website

Firefox is able to sync accross all your devices on different platforms.

  • Check for WebRTC and DNS leaks and learn how to fix them with the connection check at mullvad.net
  • Hardening and tweaking: The default settings of Firefox are not the best choice to be a privacy respecting browser. Use Firefox Profilemaker to adjust the settings
  • Browser leaks: A wide range of security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself
  • LocateJS: Predicts your location by analyzing your connection and system data
  • Cover Your Tracks: Test your browser to see how well you are protected from tracking and fingerprinting

Privacy

Tools, Tracking, Surveillance and Encryption

  • Many of the activities we carry out leave a trail of data that can be used to track our behavior and access some personal information
  • Unfortunately, there are many companies and individuals on the internet that are looking for ways to collect and exploit your personal data

Using Open-Source Software for Your Security

Open-source software is an application whose source code is available to modify

  • Businesses can use these tools to create security solutions that are tailored to their specific security needs
  • Some of the benefits include reliability and flexibility
  • Unlike proprietary software where the vendor sets limits and lock-ins that prevent some functions, these tools are flexible

Definitions

DNS-over-TLS (DoT): A security protocol for encrypted DNS on a dedicated port 853.

  • DNSCrypt (Open Specified): An older, yet robust method for encrypting DNS. It is used outside the USA or other Five Eyes countries, use a strong encryption, accept Crypto currencies or cash payments, support OpenVPN, have a no logging policy, and have a long history of operating. Accepted cryptocurrencies: Bitcoin, Litecoin, HIVE / HBD, Monero (XMR), EOS and Dogecoin. Payment options: Bitcoin Cash, Bitcoin, BCH, and Cash.

Differences between Privacy, Anonymity, and Security

Privacy is the ability to seclude any information about themselves from access or scrutiny by other parties.

  • Online security involves the use of tools to prevent issues such as intrusion of privacy, access and theft of personal and company data, phishing, and attacks on the online tools.

Warrant Canary

A term for a regularly published statement that a service provider has not received legal process that it would be prohibited from saying it had received, such as a national security letter

  • Transparency reports and warrant canaries have an important role to play in the fight against illegal and unconstitutional national security process, including National Security Letters and other secret court processes

Source