Blackphone - Ssmartphone that prioritizes the user's privacy and control, without any hooks to carriers or vendors. It comes preinstalled with all the tools you need to move throughout the world, conduct business, and stay in touch, while shielding you from prying eyes.
Brass Horn Communications - Managing Tor nodes, reporting on Internet filtering, campaigning and hacking. Provide a variety of services that are available to everyone. Additional services are available to members.
CypherNet - Pointers to information and tools necessary to ensure personal privacy. Many of these resources fall into legal gray areas, that is, their use has not been clearly regulated. Links on these issues within the U.S. and abroad can be found throughout this site and information and tools are provided in the following areas: Encryption, Anonymity, Security, Digital Cash, and Legal Issues.
Disconnect - Disconnect detects trackers based on the number of requests they've made for your information, and displays them in one of four categories: advertising, analytics, social and content. Users can re-enable a tracker or whitelist a website from the dashboard in the upper right hand corner of the Web browser. The extension also features a nifty visualization of all of the requests surrounding the page you're on, with a graph of each third-party request connected to the current page, and a rundown of web resources saved by disabling trackers, like bandwidth and browsing speed. Disconnect maintains its database of trackers by crawling popular websites for third-party requests, then categorizing those requests by type, according to co-founder Casey Oppenheim. The Disconnect database is open source. Disconnect also provides a separate browser extension that allows you to search anonymously on engines including Google, Bing, Blecko and DuckDuckGo. Disconnect routes your search queries through their own servers, so Google, for example, would effectively see and store your search as a request from Disconnect instead of you.
Doc Scrubber - Microsoft Word (.doc) files can contain more than just text you see while editing them. Depending on the settings or features you use, they may contain all kinds of additional information that you may not want shared outside your home or company. Doc Scrubber lets you see that information, and scrub it from files before sending them to others.
Immersion - From MIT, a people-centric view of your email life. Immersion currently supports only Gmail accounts. Once you log in, Immersion will use only the From, To, Cc and Timestamp fields of the emails in the account you are signing in with. It will not access the subject or the body content of any of your emails. Upon logging out of Immersion, you will be presented with a choice to save or delete your data, which contains your compressed email metadata and user profile.
Lightbeam for Firefox - An experimental add-on for Firefox and allows you to see all the third parties that are tracking your movements across the Web. It will show, in real time, how that data creates a spider-web of interaction between companies and other trackers.
National Do Not Call Registry - The National Do Not Call Registry gives you a choice about whether to receive telemarketing calls at home. Most telemarketers should not call your number once it has been on the registry for 31 days. If they do, you can file a complaint at this Website. Also see Q&A.
NoScript - Security for your web browser. Allow active content to run only from sites you trust, and protect yourself against XSS and Clickjacking attacks.
NumberInvestigator - Reverse phone resource. Provides free information about hundreds of millions of landline and cell phone numbers in the United States and Canada. This information includes approximate location, city the phone number belongs to, and phone carrier information. Its comprehensive database also includes reports on thousands of numbers used by telemarketers, scammers, debt collectors and other annoying callers. Report system allows you, the user, to report telemarketers, scammers, fraudsters, debt collectors and other annoying callers in an effort to build a global database of calls which you don't want to pick up.
Pretty Good Privacy (PGP) - MIT Distribution Center for PGP (Pretty Good Privacy). Site also provides links to extensive archives of PGP information.
Privacy - Privacy.net provides information and tips about Privacy. Read about credit reports, identity theft, Internet privacy and more.
privacyscore - Estimates the privacy risk of using a website based on how they handle your personal and tracking data. Also see FAQ.
Psiphon - Content delivery technology that delivers the net allowing: 1) Individuals to securely access multimedia Internet content anywhere, and anytime. and 2) Media producers, corporations, community groups and individuals to reach their audiences.
Public Proxy Servers - A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. Anonymous proxy servers hide your IP address and thereby prevent your from unauthorized access to your computer through the Internet. They do not provide anyone with your IP address and effectively hide any information about you and your reading interests.
Quasar IV - A self-authenticated cipherphone designed to protect your digital identity.
RoboForm - Makes the process of logging into your favorite your favorite websites and applications easier by automatically saving, then entering your usernames and passwords.
SecureSoft USA - Internet security and computer network security, including firewalls, VPN, intrusion detection and virtual private network security systems and solutions.
Stealth Wear - A collection of counter surveillance garments and accessories that explores the aesthetics of privacy and the potential for fashion to challenge authoritarian surveillance. Hosted by TANK magazine and presented by PRIMITIVE London.
SWIPE Toolkit - A collection of web-based tools that sheds light on personal data collection and usage practices in the United States. The tools demonstrate the value of personal information on the open market and enable people to access information encoded on a driver's license or stored in some of the many commercial data warehouses.
Tails - A live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Also see Wikipedia.
Tor - An anonymous Internet communication system. Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Also see Wikipedia.
Tor Project - Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Also see Tor Blog.
UltraSurf - Popular anti-censorship, pro-privacy software. Enables internet users to protect their security and anonymity online while bypassing internet censorship, and is free to users. The tool was originally designed for internet users in Mainland China, where the internet is heavily censored and internet users' activities monitored.
WebProxy - Use this free proxy to surf anonymously online, unblock any website, secure your internet connection, hide your internet history, and protect your online identity.
Wetstone Technologies - A developer of internet security, protection, and communication products: Stego Watch, Time Check, Time Lock, DETS, Net Witness, Seeing Stone, SMART Watch.
Who Has Your Back? - Electronic Frontier Foundation is tracking who is protecting your data from government requests and who isn't.
Zero-Knowledge Systems - Provides tools and strategies for protecting individual privacy for the Web, email, chat, and newsgroups.
KWSnet is an Internet subject directory providing special attention to U.S. national and international news, the arts, computing, culture, environment, law, literature, media, politics, science and technology. Based in San Francisco, California, KWSnet contains over 150,000 annotated links to resources worldwide. Use Search KWSnet, located at the top of each page, to search within this site. Use Ctrl-F (Windows) or ⌘-F (Mac) to search within individual pages.