Author: InvisibleUser Team
-> This should be in an HTML document with BS4 cards
Encryption can be useful for single files in an encrypted volume, but it is often better to encrypt an entire device. Device encryption can be done with both a PC or a smartphone. That way, you do not have to worry about where you save data, because the entire storage is encrypted. Disk encryption is a fantastic method to protect private data, but the devil is in the details. Many of the popular methods have their downfalls.
Just like you use encryption to make a message unreadable for an unauthorised person, you can do the same thing with files as well. In this chapter, we will focus on software that is specifically designed for data encryption. Those programs will come in handy if you want to encrypt many files at once, a full disk or a mobile device. Once the data is encrypted, it is called ciphertext, while unencrypted data is called plaintext.
In this guide, you will learn how secure email communication works. Not only your provider matters. A secure email client is equally important and perfectly complements a secure email provider like ProtonMail or Tutanota.
In this article, we will finally reveal the most secure encrypted email providers. They will help you avoid email-specific risks and prevent that popular email providers like Gmail spy on you. An encrypted email account is one of the most important things for communicating safely in the digital world. Keep your private emails private and never use Gmail and Outlook! If you would like to know why these two are a privacy disaster, you can find more information on that in our article “”Secure Email Communication Overview”.
In this article, you will learn how secure email communication works. We will show you the best techniques and analyse why popular services like Gmail and Outlook are dangerous.
In this article, we will talk about the popularity of open-source software and its use cases. Free software is not for computer freaks only, anymore. It is used widely by companies, governments and individuals. We will mention some statistics on both open-source program as well as the licences they are published under.
The open-source community is amazing and makes software more secure. Millions of coders find backdoors and data collection mechanisms, so they do not make their way into the open-source programs we use every day. Never trust software if you cannot inspect the source code!
You cannot trust a program if it is not open-source software! Always go for free software solutions if privacy and security are crucial. This article is our analysis of the problems that come with the lack of transparency around closed-source software and we will explain how to review proprietary applications.
Open-source software (OSS) is the key to privacy and security. In this article, you will learn what makes it awesome and better than proprietary programs. This is the first article in our new open-source software series and we will start off by defining OSS. Later, we will get into advantages and adoption of free software in businesses and governments.
First of all, VPNs are not bad in general. We just created this section to talk about the shortcomings of bad VPN providers and would like to explain why a VPN is not ideal for all situations. These services are for everyday internet browsing, but not when serious privacy and anonymity are required. VPNs are dangerous, because people are made believe they are 100% protected!
This article is a collection of our thoughts on VPNs outside of desktop software. We will share our opinion on whether an expensive VPN router is worth it and offer any real benefits to you. Additionally, we will analyse how VPNs are implemented on iOS and Android and what that means for privacy and security.
In this post, we will help you find a free VPN that offers fantastic privacy and security features. You can stay safe on the internet, without paying a penny! Additionally, you will learn about the critical WebRTC VPN vulnerability that affects most commercial VPNs, so you do not fall victim to DNS leaks.
In this article, you will learn how a VPN can protect you from surveillance by encrypting your internet connection. Never use the internet without a VPN tunnel that shields you from web trackers.
We will start our series on internet privacy with our first topic, VPNs. To correctly understand this technology, you need to know how IP addresses work and how your ISP is tracking all your internet activity. In this chapter, you will learn all those things and find out why it is so important to conceal and hide your IP address.
In our article “Why SMS are dangerous to Privacy“, we have described that you should avoid them at all costs if you need secure communication. While this is true is general, you can use SMS encryption and send secure SMS with Silence, which is an app for Android phones.
In this article, we will introduce the best private video call programs and Skype alternatives, as well as present our final verdict on Skype, where we explain why we rate it as malicious spyware.
In this article, we will analyse how police wire-tap Skype and what Microsoft did to facilitate this intrusion of privacy.
In this article, we will analyse why you cannot trust Telegram Messenger, even though it claims to be privacy-focused software.
After talking a lot about how malicious popular instant messaging services are, we will now explain why WhatsApp is a privacy disaster.
Welcome to our brief Signal Messenger guide for beginners. We would like to help you get started with secure instant messaging.
This article is a short list with the very best OTR clients.
In this article, we will get technical and explain how OTR Messaging works. We do our best to give a correct description of the OTR protocol. The post contains a simple and a difficult version, choose which one you like. Please keep in mind that even the difficult version is a strong simplification, because of the advanced mathematics that a correct and complete description would require.
In this article, you will learn how to chat securely with Signal Messenger.
In this article, we will tell you why Pidgin is the best OTR client and provide an OTR Messaging guide for beginners.
Welcome to our introduction to the OTR Messaging protocol.
Welcome to the first posts of the communication privacy guide. This is our analysis of why SMS are dangerous.
Learn how to reach optimal mobile OS privacy. In this chapter, we will focus on open-source operating systems, so we will review privacy features of Android alternatives. After talking about LineageOS as the perfect Android replacement, we will now mention some smaller mobile OSs.
Learn how to reach optimal mobile OS privacy. In this article, we will focus on open-source operating systems, so we will review LineageOS apps and features.
Learn how to reach optimal mobile OS privacy. In this article, we will focus on the open-source operating systems, so we will review LineageOS privacy features.
Learn how to reach optimal mobile OS privacy. In this post, we will focus on Apple’s operating system, so we will review iOS privacy features.
Learn how to reach optimal mobile OS privacy. In this article, we will focus on the most popular system, so we will review Android privacy features.
Here, we will look into the history of DOS, MS-DOS, FreeDOS and provide a FreeDOS guide. After talking a lot about the currently widespread OSs, we wrote this post for obsolete and lesser-known systems. Many of them are really important for niche uses like device firmware or are just very interesting. Some of the systems have a long history and really make us nostalgic.
Our rant goes on and on and we will continue to talk about Linux’ weaknesses. In this post, we will further elaborate the issues that hinder Linux adoption. If you did not red the first part yet, head back to “Linux’ Weakness 1 – Packages, Releases and Distro Websites”. We were very kind to Linux, but you should know that the distros are not perfect.
Here, we will talk about Linux’ weaknesses. We want to be honest with you. We think that the number of distros is a major hindrance for Linux’ adoption on desktop computers. The sheer number of options overtaxes beginners and the choice really matters. If you chose a distro that looked good and was recommended in forums like Manjaro, you will later find out about the lack of available software. You cannot easily change it, since you have installed a complete OS, which is not easy to fix.
Scaring newcomers away only happens with the desktop distros. For special-use distributions, you do not have a hard time finding the right one:
In the last article, we have explained why you should go for an Ubuntu-based distro if you are a Linux beginner. Now let us help you get started. In this chapter, we will only introduce some very basic Linux commands. They are used to install software, update the system in various ways and search for packages. Those are the commands you will need on your first day of using Linux. For more advanced configuration options, please visit the official Ubuntu documentation . Ubuntu commands also work on its derivatives.
In this post, we will finally offer you some assistance in choosing a Linux distro. As you have learned from the previous chapters, the choice matters. A secure OS is the basis for implementing privacy measures, but you should also feel comfortable working with it.
In this article, we will finally talk about individual “hardcore” distros, like Arch Linux. After reading this post, you can dive right in and download any of these to try them out. This is the fifth part of the list of distros and here, we will compile a list of the non-Debian distros we think you should know.
In this chapter, we will finally talk about individual Linux distros. After reading this chapter, you can dive right in and download any of these to try them out. Chapter B7 is the fourth part of the list of distros and here, we will compile a list of the non-Debian Linux distros we think you should know. They can be based on other distros than Debian, like RHEL or Slackware, but also be their own thing, solely based on the Linux kernel. All these distros look and feel different and they do not use the DEB package format, but other formats like ebuild, RPM and tarballs.
In this article, we will finally talk about individual distros. After reading this post, you can dive right in and download any of these to try them out. This is the third part of the list of distros and here, we will compile a list of the Ubuntu-based distros we think you should know. Ubuntu-based distros look and feel different, but they all use the DEB package format and are compatible to some extent.
In this post, we will finally talk about individual distros. After reading this chapter, you can dive right in and download any of these to try them out. This is the second part of our list of distros and here, we will compile a list of Ubuntu-based distros and Ubuntu flavours we think you should know. Ubuntu-based distros look and feel different, but they all use the DEB package format and are compatible to some extent.
In this post, we will finally talk about individual distros. After reading this chapter, you can dive right in and download any of these to try them out. Chapter B4 is the first part of the list of distros and here, we will compile a list of the Debian-based distros we think you should know. Debian is by far the largest family of similar Linux distros. Ubuntu, Linux Mint and many more are members of this family. It is a heterogeneous group, since the distros look and feel different, but they all use the DEB package format and are compatible to some extent.
This post introduces features of Linux distros one should know, with security and privacy in mind. Here, you will learn what tells distros apart, LTS releases, server distros and the kernel. Installing a new OS can be a big change and you can skip this chapter if you prefer to use the tools mentioned in this guide for Windows or Mac. Even if you do not want to switch entirely, we recommend you at least try Linux out. That can be done by using a live OS CD/DVD or flash drive, which does not make any changes to your machine.
This section introduces features of Linux distros one should know, with security and privacy in mind. Here, you will learn what tells distros apart, desktop environments and packages. Installing a new OS can be a big change and you can skip this chapter if you prefer to use the tools mentioned in this guide for Windows or Mac. Even if you do not want to switch entirely, we recommend you at least try Linux out. That can be done by using a live OS CD/DVD or flash drive, which does not make any changes to your machine.
Since Linux is open-source, anyone can create a new distribution or distro for short. The Linux kernel is a blueprint that lets you create your own OS. You do not have to deal with low-level (machine code) issues as much, because those are all managed by the kernel. Developers can focus on customising their distro and designing its interface and features, e.g. security and privacy options.
In this section, we will compare the privacy features of Windows, macOS and Linux operating systems and give some general information about their security.
We will now talk about the popularity of Linux. Since most Linux distros are non-commercial, it is a bit more difficult to get usage statistics. The ones we do have come largely from web analysis, which means that you log what number of Windows, macOS and Linux machines access a website.
Welcome to the first part of our comprehensive privacy and security guide on desktop operating systems (OSs). It is the most basic software that runs on your computer. This is the piece of software that turns your machine and all its processors and circuit into a usable device.
You might imagine a hacker as either a computer freak with criminal energy or a thin, young guy wearing a black hoodie. That is of course a stereotype and far from the reality. There are hacker groups that operate individually, hackers related to organised crime and even government hackers.
The importance of security is that all the privacy and anonymity measures you will learn in this guide are useless if your device gets infected or hacked. Below, you will find a very long list of malware, cyber attacks and security measures. This is only for your information and not required for understanding this guide.
The first thing that is important to understand is that no system is 100% secure. There will always be exploits and new attack patterns to infiltrate a system. When they are undiscovered by the developers, we call them zero-day-exploits. Those will be patched as soon as we know about them, but are dangerous for the time that passes until then. All we can do is make infiltrating a system as difficult as possible for the attacker. That involves keeping your system up-to-date and responding to new exploits. Cyber Security is related to privacy in that it protects a system from breaches of confidential data.
Many of us were born in and have lived their whole life in a democracy. We take it for granted that we have basic human rights, like the right to vote and that we can express ourselves freely. Unfortunately, these are not self-evident and we have to continue to fight for democracy to not lose our rights. Due to a lack of experience with undemocratic or even authoritarian state forms, many of us do not recognise the warning signs. Government surveillance is very real.
You may ask yourself why privacy and security should be important to you. You are not a criminal or terrorist, you have nothing to hide. Why do you need privacy, then? You are one of the good guys! Well, that does not stop governments or companies from collecting all the data about your private life that they can get. In the future, you will have to justify any action you take, despite not having done anything wrong.
You are a decent person, we know that, but please stay with us here: Even if you have nothing to hide, you definitely have some areas in your life, you do not want the public to know about. Be it your political opinions, your sexual orientation, the group of people you associate with in private or your browsing history on the internet.
Let us first define some basic terms that will be used in this guide. We will explain the difference between privacy and security. They are often used interchangeably, but are quite different from each other and should not be confused with one another. For example, Tails OS is often called the “most secure OS” by the media, but that is not true. It is a privacy-focused operating system and not designed for maximum security in the first place. In this section you will learn what that means.
Welcome to the first chapter of the guide. “The Journey is the Reward”, so let us begin! This is the introduction to the Privacy and Security Guide and teaches you how to use it.