Note: The list isn't up to date but a lot of the info should still be current.
INTERNET PRIVACY
This pdf collects a bunch of useful tools and writings to keep private while surfing internet.
Public link:
_____________________________
·INDEX·
1. List of resources:
. Private operating systems
. Secure mail providers
. Search engines
. Secure blog and web providers
. Uploading services
. Social media alternatives
. Computer aplications
. Phone aplications
. Web pages
2. Books
3. Articles
_____________________________
_______________________________________________________
________________ 1.LIST OF RESOURCES ________________
_______________________________________________________
· PRIVATE OPERATING SYSTEMS
·Tails (TOR,recomended): https://tails.boum.org
·Privatix: https://www.mandalka.name/privatix/index.html.en
·Ipredia(I2P): https://www.ipredia.org
·BackTrack: http://www.backtrack-linux.org
· MAIL PROVIDERS
·Riseup: https://mail.riseup.net
·Aktivix: https://aktivix.org
· SEARCH ENGINES
·Ixquick: https://ixquick.com
·StartPage: https://startpage.com
.Yacy: https://yacy.net
·DuckDuckGo: https://duckduckgo.com
· SECURE BLOG AND WEB PROVIDERS
·Network23: https://network23.org
·NoBlogs: https://noblogs.org
·Ox4: https://ox4.org
·Tachanka: https://tachanka.org
·BlogSport: https://blogsport.eu
· UPLOADING SERVICES
·CMI Brasil: http://bit.ly/15tkOos
·IMC Nottingham: https://nottingham.indymedia.org
·Archive: https://archive.org
·Mediagoblin: https://gobblin.se
· SOCIAL MEDIA AND ORGANIZERS
·Diaspora: https://diaspora.org
·Friendica: https://friendica.libertypod.com
·N-1: https://n-1.cc
·Indy.im: https://indy.im
·Status.net: http://status.net
·Crabgrass: https://we.riseup.net
·Pads: http://pad.riseup.net
https://titanpad.com
· COMPUTER APPS
·Tor, web browser: https://www.torproject.org
·Truecrypt, encryption tool: https://www.truecrypt.org
·Thunderbird, mail client: https://www.mozilla.org/es-ES/thunderbird
·TorBirdy, tor addon for Thunderbird: https://addons.mozilla.org/es/thunde...addon/torbirdy
·GPGtools, encryption packet: https://gpgtools.org
·Ekiga, voip client like skype: https://www.ekiga.net
·Adium, omni-chat messenger: https://adium.im
·Off the record: http://www.cypherpunks.ca/otr
·MAT, metadata anonymization toolkit: https://mat.boum.org
·Aegisub, subtitler: www.aegisub.org
·Wifite, wireless auditor: https://code.google.com/p/wifite
· PHONE APPS
·Replicant (operative system): https://replicant.us
·CriptoSMS, encrypted SMS: https://www.cryptosms.org
·Obscuracam:
·Orbot, Tor for Adroid: https://guardianproject.info/apps/orbot
·Orweb, tor browser: https://guardianproject.info/apps/orweb
·Gwibberbot,secure chat: https://guardianproject.info/apps/gibber
·TextSecure, encrypt text: https://securityinabox.org/en/textsecure_main
·Linphone, voip client like skype: https://linphone.org
·Ostel, encrypted phone calls: https://guardianproject.info/apps/ostel
·Pul Wifi, scanner: http://pulwifi.en.uptodown.com/android
· WEB PAGES
·Tech tools for activism: https://techtoolsforactivism.org
·Security in a box: https://securityinabox.org
·Electronic Frontier Foundation: https://www.eff.org
·Surveillance self-defense project: https://ssd.eff.org
·Movements: https://movements.org
·FLOSS Manuals: http://flossmanuals.net
·Altenatives: https://alternatives.tacticaltech.org
·The info activist guide: http://howto.informationactivism.org
·Ono Robot (for dummies): https://onorobot.org
_______________________________________________________
______________________ 2. BOOKS _______________________
_______________________________________________________
-Basic internet security
http://en.flossmanuals.net/_booki/ba...t-security.pdf
-How to bypass internet censorship
http://en.flossmanuals.net/_booki/by...censorship.pdf
-Tech Tools for Activism
http://hacktionlab.org/hacktionlab/u...or_print_1.pdf
-Mail encryption
http://en.flossmanuals.net/_booki/th...d-workbook.pdf
-FLOSS manuals
http://flossmanuals.net
_______________________________________________________
____________________ 3. ARTICLES ______________________
_______________________________________________________
-Data security and privacy: can we have both?
http://www.theguardian.com/news/data...an-we-haveboth
-Bloggers at Risk: Creating a Contingency Plan
https://www.eff.org/deeplinks/2011/1...-risk-bloggers
-10 trucos para burlar el espionaje de la NSA en Internet
http://actualidad.rt.com/actualidad/...e-internet-nsa
-Cryogenically frozen RAM bypasses all disk encryption methods
http://www.zdnet.com/blog/security/c...yptionmethods/
-Full disk encryption is too good, says US intelligence agency
http://www.extremetech.com/computing...ligence-agency
-Anonymous Blogging with WordPress & Tor
http://advocacy.globalvoicesonline.org/projects/guide
-How not to get your Twitter account hacked
http://www.journalism.co.uk/news/how...ked/s2/a553074
-Use your mobile securely
http://www.movements.org/how-to/entr...y-for-activism
-Open Safer Mobile, collection of resources for a secure mobile phone use
https://github.com/opensafermobile/materials
-Digital security basics for journalists
http://nationalsecurityzone.org/site...r-journalists/
-BlackBerry email, chat to be tracked from August 1
http://businesstoday.intoday.in/story/blackberry-email-chat-to-be-tracked-fromaugust-1/1/197322.html
Source
Social Networking Bookmarks