The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.
A mirror of the site can be downloaded for archival and offline use: https://digitalfirstaid.org/dfak-offline.zip
Git repo: https://gitlab.com/rarenet/dfak
License: Creative Commons By-Attribution v4.0
Opt Out is a podcast where I sit down with passionate people to learn why privacy matters to them, the tools and techniques they’ve found and leveraged, and where we encourage and inspire others towards personal privacy and data-sovereignty.
The CSRC provides a searchable database of resources on the topic of counter-surveillance, with a focus on targeted surveillance against people who have things to hide. We want to help anarchists and other rebels acquire a practical understanding of the surveillance threats they may face in their struggles and in their lives. We prefer resources written by friends and understandable without prior technical knowledge.
Generate random phone numbers for all countries using the mobile phone generator. These numbers are fake, but they are built using the validations of telephone numbers.
For a price of a cinema ticket a month we offer a physical phone number. All your messages are encrypted with your personal key that we cannot access. Has a REST API you can send and receive messages through. They can store contact lists for you, deniably they claim. Accepts cryptocurrency for payment.
This updated guide aims to provide introduction to various tracking techniques, id verification techniques and guidance to creating and maintaining anonymous identities online including social media accounts safely.
Will this guide help you protect yourself from the NSA, the FSB, Mark Zuckerberg or the Mossad if they’re out to find you? Probably not … Mossad will be doing “Mossad things” and will probably find you no matter how hard to try to hide.
Creative Commons Attribution 4.0 International (cc-by-4.0)
A single command sets up a brand new Ubuntu 16.04 server running a wide variety of anti-censorship software that can completely mask and encrypt all of your Internet traffic. Uses Vagrant and Ansible to automate the process, from creation of OS image to deployment. Generates documentation as an HTML page to send to whomever you want to use the VPN server. Sets up a verified mirror of all the software the user might need, including VPN clients. Even implements techniques for evading some network blocking methods.
An online service that acts as a telephony middleman - you tell them what number to call, what number you want to show up on both Caller ID and the bill, and what your number is, and they'll connect the two numbers with the spoofed information of your choice.
An application which makes it easier to tunnel IP traffic through the Tor darknet. Stand-alone application. The OS you run this on must have support for IPv6 enabled, though OnionCat can be configured to use IPv4 as well. Gives hidden services IPv6 addresses to make them easier to connect to. Also makes it possible to provide hidden services as easily as one can provide public services on the Net, such as SMTP, DNS, and even VPN.
A command line utility which makes it easy to use certain applications with Tor.
A suite of shell scripts to automate the installation and configuration of FreeBSD in such a manner as to support anonymity and security. Helps with the rapid deployment of BSD machines that can then be used as Tor nodes, hidden service providers, and locked-down desktop machines.
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
A website that offers email addresses that are only good for ten (10) minutes at a time, though you can opt to extend their lifetime to 100 minutes if you keep refreshing it.
Anonymously and securely send files to and receive files from people. Zips up the files, starts a local web server on your computer with a link to this zip file, makes this website accessible as a Tor onion service, and shows you the URL of the web server. You send someone this .onion URL, they load it in Tor Browser and then they can download the zip file. As soon as the download is complete, OnionShare shuts down the web service. Can be used to host an entire (static) website.
A collection list of selfhosted apps to increase one's privacy and possibly anonymity. webapps tools
APAF is a set of modules for Python that make it easier to develop network applications (it's built on top of Twisted) that run inside of darknets primarily (the Tor network, in particular). Cross platform. Designed to be run portably (i.e., without installation). Tries to make it as easy as possible to set up the networking stuff so you can concentrate on the application stuff. Engineered so that the traffic runs over Tor nicely and safely, but ensuring that you don't screw up and leak data is up to you.
4030 links, including 257 private