A password manager/generator that takes a master password, a URL, a username, and optionally a serial number (for when you have to change passwords) and (re)generates the password for you. Requires no database or third party storage - the right password is always generated for you. Desktop versions, browser plugins, and a cli tool.
No notepad feature, so no storing your 2fa recovery codes there.
A curated checklist of tips to protect your digital security and privacy.
A smart solution to the problem of passwords. Cloverleaf generates passwords on demand, using the name of the app you're making a password for and a master password to derive a passcode. Enter those two things and you don't need to store the passcode because you can re-generate it whenever you want.
Can be installed as a native app and used offline.
This updated guide aims to provide introduction to various tracking techniques, id verification techniques and guidance to creating and maintaining anonymous identities online including social media accounts safely.
Will this guide help you protect yourself from the NSA, the FSB, Mark Zuckerberg or the Mossad if they’re out to find you? Probably not … Mossad will be doing “Mossad things” and will probably find you no matter how hard to try to hide.
Creative Commons Attribution 4.0 International (cc-by-4.0)
Threat models and tools for staying safe, private and informed while Online, used by the average person.
A huge list of alternatives to Google products. Privacy tips, tricks, and links. Browser addons, replacements, alternatives, risk overviews and *-eyes hazard ratings.
This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical “wormhole codes”: in general, the sending machine generates and displays the code, which must then be typed into the receiving machine.
The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized.
Can also be used as a module called from other code.
System tampering detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet. Ostensibly shuts the whole thing down but can be configured to do other stuff. I don't know how reliable it is, haven't audited the code yet. Written in Python.
A site that documents the practice of letterlocking - cleverly folding, cutting, and sealing letters in the 17th century for tamper evidence and security.
A website that offers email addresses that are only good for ten (10) minutes at a time, though you can opt to extend their lifetime to 100 minutes if you keep refreshing it.
A FOSS utility for investigating Tor hidden services. Searches for configuration errors and information leaks. Written in golang. In the AUR. CLI tool but the Onionscan Correlation Lab is a webapp that lets you analyze the data visually.
A utility written in Python that makes it easier to use an SDR to find bugs in a room.
3745 links, including 199 private