Privacy

Basic blueprints for Independence or adult video website/brand/fan club/building/consulting/marketing aka a PROgram for success… MANagement. NOT a sponsor, sugar daddy, square, or boyfriend. http://prism-break.org

If you don’t care about your own privacy it’s proof positive you don’t care about anyone else’s. EVERYONE should be using the SIGNAL app in any app store. No links search and install for free. Unencrypted= postcard, encrypted= coded message in a stamped, sealed envelope. Conversation between parties have the right to privacy.

Safe Practices.


Remember they can prove it’s you speaking, but they can’t prove it’s you typing if you know what you are doing.


If someone has your real phone number & real IP address they have your REAL location. https://www.locationsmart.com/try (dont try) has been illegaly used for years by law enforcement to stalk, harass, parallel construct & entrap citizens with no oversight. It uses cell phone companies location API and gives anyone with an account that they don’t verify documents with to obtain real time location of your cell phone with only the number, no warrant, no due process, no pen register needed. Remove battery & sim on your siloed phone when traveling or at home.

Utilize VPNs & throwaway phones as much as possible.

PSA unfortunately these days if you want your meetings to actually be private, after making arrangements via free, open source, encrypted, text, video, chat, app Signal…..
utilizing faraday cell phone bags 5+ miles/30minutes from destination, removing cell phone battery 5+ miles/30 minutes, from destination, using cigarette lighter cell phone jammer if legal in your locale 5+ miles/30 minutes from destination….AND not powering on 5+ miles/30 minutes after your appointment is over…

Don’t use the camera phone to take pictures, get a separate digital camera…

Android = Replicant, CyanogynMod, & Orbot TOR Browser for secure mobile browsing. RedPhone for encrypted voice, TextSecure for encrypted texting, An App called ChatSecure will encrypt your Google Talk/Hangout/Facebook Chats, Android IMSI Catcher/Detector, PrivateInternetAccessVPN or PROxpn VPN for android. Dolphin Zero Browser, SureSpot FREE another encrypted text option
Blackphone & Cryptophone also have encrypted communication devices available.
Use assumed name for cell phones, internet, websites, utilities…. use Airplane mode wifi only devices when you can. Utilize safety deposit boxes & personal mail boxes, no real address on I.D…..Utilize trusts, 501(c)(3)s, LLCs, DBAs, REITS etc…..Use Cash, Reloadable Green Dot Money Paks, Pre-paid credit cards, & pre paid cell phones when you can. Nexus Phone, Wifi only $249 or Less Nexus 7 Tablet
Never use an email to reply to an ad that you used to post an ad. Use separate email address that you never use for anything else to post ads, delete this email account every 6 months & create a new one, never reply from it. POST ADS & REPLY TO RESPONSES FROM DIFFERENT EMAILS. NEVER USE THESE EMAILS FOR ANYTHING ELSE DELETE & REPLACE EVERY 6 MONTHS.

Make the phone number you use in an ad incoming ONLY never call back or send messages from it, just use the number in ads for receiving texts or voice mails. Use a separate phone number that is not published anywhere online or in ads to communicate with clients.

Never use hotel/public FREE wifi without using a VPN. If you are using someone elses “free” network they can see what pages you visit, EVERYTHING YOU DO, etc….PrivateInternetAccessVPN or ProXPN VPN has a FREE basic account, & the Tiny Hardware Firewall is a portable Hardware VPN solution
Search for hidden cameras when doing outcalls to private homes & even hotel rooms, use a video signal jammer or detector if you can, some people hide cameras to get content to sell or use for blackmail, when webcamming watermark your outgoing video stream or include email or contact info somewhere in frame so footage can be traced back to you if person on otherside of stream is capturing for resale. If they can see you on their screen they can capture the video to sell or post elsewhere. You can Add watermark to outgoing video stream or add watermark to your skype, google hangout, twelephone chat with the following software VidBlaster, Wirecast, WebCamMax, VMix…..

If you are ever at a Vegas Casino & security asks for your I.D., keep walking towards an exit, & say you don’t have it on you. Leave ASAP. Casino security is the equivalent of mall security they cannot detain, touch, or search you without police present. If you give them your I.D. your name & face will be in the i-Trak system whether you are innocent or guilty of anything. It’s best not to be in that system so again say you don’t have it & leave. There is a chance they will get a decent pic from a security cam but it will be under Jane Doe so just leave, there are plenty of other casinos to go visit, just stay away for a while. Approx 3 companies own all the strip casinos so when you’re in 1 system 9 other casinos will have you in their system. Be polite & live to work another day. The longer you can go without being banned from a casino and remain under the radar the better. It’s hard to make money in Vegas when you’re walked out of a casino on site when you’ve just walked in. If you are walking you are also not required to show police your I.D. politely ask if you are free to go, if they say no, you then ask “Am I being detained?” if the answer is no you are free to leave if they say yes, comply with their request for I.D. and let them know you will not answer any questions without a lawyer present. Be polite & remember they are NOT your friends, they are not there to help or protect you.

The only 3 things you EVER have to say to a law enforcement official is.
1. Am I free to go?
2. Am I under arrest?
3. May I speak with an attorney?

Android = Replicant, CyanogynMod, & Orbot TOR Browser for secure mobile browsing. RedPhone for encrypted voice, TextSecure for encrypted texting, An App called ChatSecure will encrypt your Google Talk/Hangout/Facebook Chats, Android IMSI Catcher/Detector, PrivateInternetAccessVPN or PROxpn VPN for android. Dolphin Zero Browser, SureSpot FREE another encrypted text option
Have guests remove cell phone batteries & store mobile devices/ cellphones in stainless steal martini shakers or ss lunch boxes inside refrigerator while visiting. Have guests remove their mobile device batteries 30minutes to 1 hour prior to visiting your location & leave in the car, & wait 30minutes to 1 hour after leaving before powering back on. There are also bags available on Amazon that block cell phone transmission.
Give guest(s) tour of location leave closets, doors, shower curtains open.
Use locations with parking garages common with higher end hotels & airports. If not possible try to have guests park nearby not directly on property within 5 minute walk. Always check in alone. When giving out your location use hotel across the street or nearby, never post actual location in ad only a nearby major intersection or landmark. Try to meet at hotel lounge or floor before giving out your room number.
Use VPNs or TOR while browsing the internet. . See if cell phone / GPS / WiFi / Bluetooth / Video Signal jammers are legal in your area. Apps are what were called spyware, adware, malware decade(s) ago try not to use them place shortcut links to https://website on screen & visit like a webpage.

How to Enable Encryption on Android

When you 1st purchase your Android phone or tablet encrypt it 1st. This process can take up to an hour you can also encrypt the microsd card is applicable.This will encrypt all the data on your phone when in locked mode and every time you turn off your device.
If you are in the process of being detained or pulled over turn your phone off, remove your battery, or both. Corrupt officials have devices that can copy the contents of your phone in minutes & they have been known to use them without consent or legal right to do so. If your device is encrypted the data they get will be unreadable. If anyone ever asks you for your pass/pin code the correct legal term is “I don’t recall it at this time” Police CAN & WILL Lie to you, but it is against the law to lie to police. Memory loss is not a lie.
Some recent legal rulings have suggested that encryption can protect against warantless searches. The California Supreme Court has ruled that police officers can lawfully search your cell phone without a warrant if it’s taken from you during arrest – but they would require a warrant if it was encrypted. A Canadian court has also ruled that phones can be searched without a warrant as long as they’re unencrypted. (But remember, we’re not lawyers here!)

Encrypting your phone means your files are encrypted at rest when the phone is locked. Any files you send and receive from your phone won’t be encrypted, unless you employ other methods to make them so.—Android = Replicant, CyanogynMod, & Orbot TOR Browser for secure mobile browsing. RedPhone for encrypted voice, TextSecure for encrypted texting, An App called ChatSecure will encrypt your Google Talk/Hangout/Facebook Chats, Android IMSI Catcher/Detector, PrivateInternetAccessVPN or PROxpn VPN for android. Dolphin Zero Browser, SureSpot FREE another encrypted text option , PROxpn VPN for android
The only difference on the user side between an unencrypted and an encrypted phone is that you’ll now have to use a passcode to unlock your phone.
For basic security reasons, you should already have your phone set to ask for such a code before it unlocks, but if you haven’t, this added step might take some getting used to.
On unencrypted phones, this passcode merely locks the screen — it doesn’t do anything to secure the files that are stored on your device. So if attackers find a way around the lock screen, they’ll then have full access to your files.
On an encrypted phone, the passcode is the key that decrypts your encrypted files, kind of like a key opens a lockbox.
When your phone is locked, the encryption is in place, so even if attackers get around the lock screen all they’ll find is the scrambled data that encrypted files appear as.
1. Open up your Settings menu. You can do this by tapping the menu button on the lower left of the phone, and then tapping Settings.
2. In Settings, go to Security. You’ll find this selection under the More tab at the top of the screen in Android 4.2.2 and other recent versions.
3. Under Security, tap Encrypt Device. At this point, you’ll be prompted to enter a passphrase of at least six characters, at least one of which is a number.
Once you decide on a passcode, your phone will start the process of encrypting your files. This can take an hour or more, so you should plug in your phone charger before you start.
Once the encryption process is complete you’re done! Be sure to store your passcode in a safe place, as you’ll now need it to access your phone and there’s no way to recover a forgotten password.
All Custom Notebooks & PCs come fully encrypted with the hard drives pre partitioned, & Triple Boot Capabilities. You will be able to boot into multiples OS’s (Operating Systems) We use Windows 7 & 8 64Bit Home Premium & the newest version of Linux Mint . Copies of Linux Liberte & Linux Tails are included with your PC They can be run off a disc or a usb drive as back up Os’s . A full format is performed on all hard drives before custom installs and a full defrag with MyDefrag is performed after updates and custom installs so data is continuous on your drive (Not performed on systems with SSDs (Solid State Drives). All other Top Notch products & gadgets are updated with the newest firmware available before shipped to optimize performance.
Security / Safety / Privacy
Notebooks, Desktops, Gadgets should be fully wiped or have a Full Format performed on them at least once every 6 months with a fresh Re Install to protect against 0 day exploits, key loggers, root kits, & HID attacks via devices like the USB Rubber Ducky
Security / Safety / Privacy
TopNotch Custom Notebooks & PCs ship with Windows Update Fully Updated along with the following Safety & Security Software Installed. Windows Security Essentials AntiVirus, MalwareBytes, SpyWare Blaster, Spy Bot Search & Destroy, CryptoPrevent, CCleaner Slim, HiJack This, MalwareBytes Anti Root Kit, Deep Freeze, along with a shortcut link to erase Flash Cookies. They are all conveniently located in a safety folder on the desktop.
Security / Safety / Privacy – the only programs you should need.
All TopNotch Custom Notebooks & PCs come with the following Web Browsers installed all will be the most current versions of Internet Explorer , Mozilla Firefox TopNotch PCs also come with the TOR browser bundle for anonymous browsing as well as DuckDuckGo as default anonymous search, don’t forget OpenStreetMaps & BitMessage for encrypted email. CryptoCat for encrypted chat in your browser. BitTorrent Sync (Works with Windows Android Linux Apple) for encrypted file/message sharing. A VPN should be used when browsing the web OpenVPN is FREE some paid easy to use options include PrivateInternetAccess VPN, ProXPN VPN, Hamachi LogMeIn for remote access, the Tiny Hardware Firewall is a portable Hardware VPN. All TopNotch PC browsers switch DNS servers to the OpenNic project for a private DNS.
Security / Safety / Privacy… Must Have FireFox Extensions:
UBlock Ad Blocker, Random Agent Spoofer,
HTTPS Everywhere, Privacy Badger, Disconnect disables 3rd party tracking, NoScript, Request Policy, Self Destructing Cookies, Calomel SSL Validation, Decentraleyes, PoliceMan, DuckDuck Go, Do Not Track Me, CryptoCat, Ghostery, Mailvelope, Click & Clean, Security / Safety / Privacy… Must Have FireFox Extensions

All Custom Notebooks & PCs also come with the following software programs installed Windows Live Essentials, Paint.net, ImgBurn, SlySoft Virtual CloneDrive, KLite Codec Pack with Media Player Classic, VLC Player, DVD Decrypter, DVD Shrink, Foobar Music Player, Pidgin Instant Message Chat Client with OTR PIDGIN encryption, Open Office, Microsoft Office 365 Web Apps, Google Docs, Exact Audio Copy, Audacity, Lame Mp3 Encoder, AutoGK, VobSub, DivX codec/Web Player, The latest version of Silverlight, Flash, Air, & Quicktime, 7Zip, Jitsi Encrypted text & video chat (Skype/Facetime/Hangouts alternative),Mumble encrypted voice audio only chat, File Renamer Basic, DirPrint, Foxit PDF reader, Tor for anonymous web surfing, TrueCrypt if you wish to encrypt your hard drive or files, BitCoin Anonymous virtual crypto currency Trade BitCoins for anonymous no middlemen transactions, Calibre to convert your ebooks for ebook readers, PS3 Media Server, PDAnet to tether Android phones via usb, & SubAir along with a free 90 day subscription to the TopNotch Radio Netcast…..
You can Add watermark to outgoing video stream or add watermark to your skype, google hangout, twelephone chat with the following software VidBlaster, Wirecast, WebCamMax, VMix…..
There will be a software folder which includes all of the above mentioned install files along with image files of the latest Linux Mint OS, Linux Ubuntu OS, Dban (Darik’s Boot & Nuke) to completely wipe hard drives for resale or disposal, Kali Linux (Back Track Linux replacement), and a back up image of your system if you ever need to restore.. WireShark for WiFi Network Protocol analyzer.WiFi Pineapple Hot-Spot Honeypot Pen-Testing Platform, Scappy packet analyzer. DNSRU, AirCrack-ng WEP and WPA-PSK key cracking program, These are all stored on the separate partition.
TopNotch Custom Notebooks can also be configured with the following software programs for an additional fee as the software is not free. Microsoft Office 15 , Adobe CS5 Products, Adobe Photoshop Elements, Winrar, Sony Vegas, Ulead…..Other software packages available just ask and we will send a price quote.

Crummey Trusts Aren’t Crummey NBA We Still Return 20%

This is a collection of privacy related about:config tweaks. We’ll show you how to enhance the privacy of your Firefox browser.

Preparation:

  1. Enter “about:config” in the firefox address bar and press enter.
  2. Press the button “I’ll be careful, I promise!”
  3. Follow the instructions below…

Getting started:

  1. privacy.trackingprotection.enabled = true
    • This is Mozilla’s new built in tracking protection.
  2. geo.enabled = false
    • Disables geolocation.
  3. browser.safebrowsing.phishing.enabled = false
    • Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
  4. browser.safebrowsing.malware.enabled = false
    • Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
  5. dom.event.clipboardevents.enabled = false
    • Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
  6. network.cookie.cookieBehavior = 1
    • Disable cookies
    • 0 = Accept all cookies by default
    • 1 = Only accept from the originating site (block third party cookies)
    • 2 = Block all cookies by default
  7. network.cookie.lifetimePolicy = 2
    • cookies are deleted at the end of the session
    • 0 = Accept cookies normally
    • 1 = Prompt for each cookie
    • 2 = Accept for current session only
    • 3 = Accept for N days
  8. browser.cache.offline.enable = false
    • Disables offline cache.
  9. browser.send_pings = false
    • The attribute would be useful for letting websites track visitors’ clicks.
  10. webgl.disabled = true
    • WebGL is a potential security risk. Source
  11. dom.battery.enabled = false
    • Website owners can track the battery status of your device. Source
  12. browser.sessionstore.max_tabs_undo = 0
    • Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.

Related Information

  • ffprofile.com – Helps you to create a Firefox profile with the defaults you like.
  • mozillazine.org – Security and privacy-related preferences.
  • user.js Firefox hardening stuff – This is a user.js configuration file for Mozilla Firefox that’s supposed to harden Firefox’s settings and make it more secure.
  • Privacy Settings – A Firefox addon to alter built-in privacy settings easily with a toolbar panel.

How to Enable Encryption on Android

Encryption may take an hour or even longer, depending on how much data you have on your device. Plug in your phone and ensure you have enough time before continuing. If you have to interrupt the encryption process, you’ll lose some (or all!) of the data on your phone.
Before you continue, ensure you have a lock screen PIN or password set up. Android won’t allow you to encrypt your device until you create a PIN or password. To set one up if you haven’t already done so, open your device’s Settings screen, tap Security, tap Screen Lock, tap PIN or Password, and set up a new PIN or password.
android-choose-a-pin
You can now encrypt your Android phone’s storage. Open its Settings screen, tap Security, and tap Encrypt phone (or Encrypt tablet) under Encryption.
android-enable-encryption
Read the warning information and tap the Encrypt phone button to continue. You’ll see a message telling you to plug in your phone if it’s not plugged in yet.
android-encrypt-phone-information-screen
You’ll have to provide the lock-screen PIN or password to continue with the encryption process. Agree to the warning and then leave your phone alone for a while – it may take an hour or more. Don’t interrupt the phone while it’s encrypting its storage.
(When we tried this on a Nexus 4 running Android 4.2.2, our phone just rebooted itself instead of beginning the encryption process. We got around this apparent bug by trying again several times. If your phone reboots itself, try initiating the encryption process again and keep trying until it works. We had to try three times on our Nexus 4 before it worked.)
android-cant-interrupt-encryption
You’ll see a progress indicator appear. After it’s done, your device’s storage will be encrypted. You’ll have to enter the PIN or password each time you boot your phone or its storage will be unreadable, so don’t forget the password! If you do, you can only remove the encryption by performing a factory reset.
If you used a PIN instead of a password, you’ll get a password prompt anyway. Just enter the PIN number using the numeric keyboard.

courtesy of http://prism-break.org

Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. Stop governments from spying on you by encrypting your communications and ending your reliance on proprietary services.

Operating system

Proprietary

  • Apple OS X
  • Google Chrome OS
  • Microsoft Windows

Free alternatives

  • GNU/Linux

  • Debian

    Strictly free, ethical GNU/Linux distribution. most stable


  • Fedora

    Fast, stable and powerful GNU/Linux distribution. most cutting edge


  • Gentoo

    GNU/Linux distribution about choice, control and security. most advanced features


  • Linux Mint Debian Edition

    Comfortable and easy-to-use GNU/Linux distribution based on Debian. friendly defaults


  • openSUSE

    Stable, easy-to-use multi-purpose GNU/Linux distribution. easiest to use

  • BSD

  • OpenBSD

    A secure BSD operating system. most paranoid

Notes

Apple, Google, and Microsoft are allegedly a part of PRISM. Their proprietary operating systems cannot be trusted to safeguard your personal information from the NSA. We have two free alternatives: GNU/Linux and BSD.
Debian has a long tradition of software freedom. Contributers have to sign a social contract and adhere to the ethical manifesto. Strict inclusion guidelines make sure that only certified open source software gets packaged in the main repositories.
Gentoo describes itself as a meta-distribution. The source code is compiled to binary applications on the user’s machine allowing near-unlimited adaptability and complete retraceability of the program logic.
Linux Mint Debian Edition (LMDE) is probably the easiest-to-use distribution for people migrating from Microsoft Windows. However, note that LMDE does not support full disk encryption.
Both Fedora and openSUSE are community editions that serve as the stable basis for enterprise ready GNU/Linux distributions with commercial support. Companies all over the world trust Red Hat Inc. and SUSE Linux GmbH because of their transparency throughout the whole development process.
Canonical’s Ubuntu is not recommended by PRISM Break because it contains Amazon ads and data leaks by default. GNU/Linux distributions based on Ubuntu are also currently not recommended due to several other reasons.

Live CDs & VM images

Free alternatives


  • Liberté Linux

    Live CD/USB based on Hardened Gentoo designed as a communication aid in hostile environments.


  • Tails

    Live CD/USB based on Debian and Tor aimed at preserving your privacy and anonymity.


  • JonDo

    Live CD/USB based on Debian with pre-configured tools for anonymous surfing and more.


  • Whonix

    VM-friendly OS based on Debian and Tor focused on anonymity, privacy and security.

Notes

A live distribution like Tails or Liberté Linux is the fastest and easiest way to a secure operating system. All you have to do is create a bootable CD or USB drive with the files provided and you’re set. Everything else will be preconfigured for you.
A virtual machine (VM) image like Whonix is designed to be run inside of a virtualization package like VirtualBox. VirtualBox can be installed on Windows, Linux, OS X, and Solaris. This means that if you’re stuck using Windows or OS X for whatever reason, you can install VirtualBox and use Whonix to increase your privacy and security.

Android

Proprietary

  • Google Android
  • Google Play

Free alternatives

  • Operating system


  • CyanogenMod

    Aftermarket firmware for Android devices.


  • Replicant

    Fully free Android distribution based on CyanogenMod. FSF endorsed


  • Firefox OS

    Free and open source operating system for Android-compatible devices.

  • Digital distribution

  • F-Droid logo
    F-Droid

    Free and open source alternative to the Google Play app store for Android. FSF endorsed

Notes

If Replicant supports your Android device, you should definitely use it instead of Cyanogenmod, as Replicant is fully free and runs without relying on proprietary system code.
CyanogenMod licensing:

“CyanogenMod does still include various hardware-specific code, which is also slowly being open-sourced anyway.”

Google Apps for Android (Gapps) are the proprietary applications by Google that come pre-installed with most Android devices. After flashing your firmware with either Cyanogenmod or Replicant, safeguard your data by not re-installing Google Apps on your phone.
Uninstall Gapps from any firmware with this guide by ciddaemon.

iOS & WP

Proprietary

  • Apple iOS
  • Microsoft Windows Phone

Free alternatives


  • No alternative

    Replace the device—these operating systems have no free alternatives.

Notes

iOS and WP are proprietary operating systems whose source code are not available for auditing by third parties. You should entrust neither your communications nor your data to a closed source device.

Web browser

Proprietary

  • Apple Safari
  • Google Chrome
  • Microsoft Internet Explorer
  • Opera

Free alternatives

  • IP hidden

  • Tor Browser Bundle

    Encrypted, anonymous web browsing powered by the Tor network.


  • JonDonym

    Private browsing with the JonDo IP anonymization service and JonDoFox profile for Firefox.

  • IP exposed

  • Mozilla Firefox

    Fast, flexible and secure web browser with a vibrant add-on ecosystem.

  • Android

  • Orbot

    The features and functionality of Tor for Android.

  • Apple iOS

  • Onion Browser

    Surf the web through the Tor network with this open source browser for iOS devices. paid software

Notes

Try to use Tor Browser Bundle (TBB) for all of your web surfing. It will offer you far better anonymity than any other browser. Make sure to learn the basics of Tor before using it. If the site you want to visit will not work in the TBB, try Firefox instead, but realize these browsers do not anonymize your IP by default.
TBB notes: Using the TBB to sign into websites that contain your real ID is counterproductive, and may trip the site’s fraud protection. Make sure to check for HTTPS before signing in to a website through Tor. Signing into HTTP websites can result in your ID being captured by a Tor exit node.
Firefox notes: This browser uses Google search by default: replace it with a more private alternative. Another debranded alternative to Firefox is Iceweasel, a browser for Debian-based distributions.
Why are Chromium, SRWare Iron, et al. not recommended on PRISM Break? More info here.
Warning for mobile devices & Tor: Websites using HTML5 <video> tags will leak <video>-related DNS queries and data transfer outside of Tor.
Why are privacy- and security-enhancing addons for proprietary browsers not listed?
Because the improvements they may achieve can not be significant in the context of their untrustworthy host browser. Switching to a free, open-source browser like Firefox achieves better improvements.

Web browser add-ons

Free alternatives

  • Privacy & security

  • Adblock Edge

    Block advertisements and trackers across the web with filter subscriptions.


  • Disconnect

    Visualize and block invisible tracking of your search and browsing history.


  • HTTPS Everywhere

    Encrypt your communications from thousands of websites by enforcing HTTPS everywhere.


  • NoScript

    Only enable JavaScript, Java, and Flash for sites you trust. advanced


  • RequestPolicy

    Control which cross-site requests are allowed by sites you visit. advanced

  • Instant messaging

  • CryptoCat

    Private and encrypted instant messaging within the web browser. OTR

  • Email encryption

  • Mailvelope

    OpenPGP email encryption tool for major webmail services. PGP beta

Notes

Installing your own add-ons into the Tor Browser is not recommended, as they may bypass Tor or otherwise harm your anonymity and privacy. Check the EFF’s Panopticlick to see how trackable your browser configuration is by third parties.
If you’re using a Firefox-based browser, you can safeguard your browsing habits and stop advertising companies from tracking you by installing Adblock Edge, Disconnect, and HTTPS Everywhere.
Install NoScript and enable ‘Forbid scripts globally’ to improve the security of your browser by preventing 0day JavaScript attacks. This is a drastic option as it will render many websites unusable as they rely heavily on JavaScript. NoScript offers a whitelist you can use to selectively enable JavaScript for sites you trust, but this is considered especially bad for your anonymity if you’re using NoScript with Tor.
Why is Adblock Plus not recommended? Adblock Plus shows “acceptable ads” by default, which works against the purpose of the add-on. Either disable acceptable ads or use the Adblock Edge fork instead.
Ghostery is an alternative anti-tracker add-on to Disconnect. While the code is available, the license is currently proprietary.
TheRequestPolicy-addon offers a 1.x beta release channel which enables default policies and subscriptions. Activating “Block requests by default”, “Allow requests to the same domain” combined with some “Usability” subscriptions should yield a largely undisturbed surfing experience, while blocking most trackers.

Maps

Proprietary

  • Apple Maps
  • Google Maps
  • Google Earth
  • Microsoft Bing Maps
  • Yahoo! Maps

Free alternatives

  • Service

  • OpenStreetMap

    Free, collaborative world wide map.

  • Software

  • Marble

    Free virtual globe and world atlas.

  • Android

  • OsmAnd

    OsmAnd (OSM Automated Navigation Directions) is a map and navigation app that uses OpenStreetMap data.

Notes

“If you spend time contributing to OpenStreetMap you are helping a good cause, and building a geographic database of the world which is free and open for all and forever.”

Email service

Proprietary

  • Google Gmail
  • Microsoft Outlook.com
  • Yahoo! Mail

Free alternatives

  • Service

  • Autistici/Inventati

    A full range of privacy-aware services including hosting, VPNs, email, IM, and more. approval required


  • MyKolab

    Secure, private Kolab accounts hosted in Switzerland. Email from 4.85 CHF, full groupware from 9.70 CHF per month. paid service


  • Riseup

    Secure communication tools for people working on liberatory social change. invitation required USA hosted

  • Peer to peer software

  • Bitmessage

    Encrypted, decentralized P2P messaging service based on Bitcoin technology. beta


  • RetroShare

    Secure P2P communications platform offering IM, forums, VoIP, file sharing, and more. PGP

Notes

For more email providers, take a look at Privacy-Conscious Email Services. Please decide for yourself whether if you trust them with your data. For more discussion about safe email providers, please see issue #461.
MyKolab is hosted in Switzerland and benefits from the strong Swiss privacy laws. It is run exclusively with free software and using the service supports the development of Kolab. Also, it lets you export all your data at any time.
Riseup’s services may also be accessed via their Tor Hidden Service addresses. A list is available here.
Bitmessage is a promising alternative to email, but it has not yet been audited by security professionals. Use at your own risk. If you decide to try out Bitmessage, make sure to generate a completely random ID to greatly reduce the probability of ID collisions.
RetroShare has not been thoroughly audited by security professionals for possible security issues.
Why not Hushmail? See ‘compromises to email privacy’.
If you have the technical aptitude, consider running your own mail server.

Email client

Proprietary

  • Apple OS X Mail
  • Microsoft Office Outlook

Free alternatives


  • Mozilla Thunderbird

    Multi-platform email application with mail encryption through the Enigmail add-on.


  • Enigmail

    OpenPGP email encryption add-on for Thunderbird and Icedove. PGP


  • TorBirdy

    Add-on that makes Thunderbird and Icedove connect through Tor. experimental


  • Claws Mail

    Lightweight, featureful email application for multiple platforms with built-in PGP support. PGP


  • Sylpheed

    Lightweight, user-friendly email application for multiple platforms with built-in PGP support. PGP

  • Android

  • K-9 Mail

    Email application for Android devices with built-in PGP support. PGP

Notes

Switching from a proprietary service like Gmail to one of the more transparently-run email services on PRISM Break is the first step to a secure email account.
The second step is getting you and your contacts to encrypt your plain text messages with PGP encryption. This section contains free email clients that support PGP.
Here is a guide by Security In A Box to encrypting your email with Mozilla Thunderbird, GNU Privacy Guard (GPG), and Enigmail.
Find out more about the differences between Mozilla Thunderbird and Icedove.

Email encryption

Free alternatives


  • GNU Privacy Guard – GPG

    OpenPGP implementation for numerous frontends, including Thunderbird/Icedove.


  • GPGMail

    OpenPGP add-on for Apple OS X Mail.

  • Android

  • APG

    OpenPGP implementation for Android.

Notes

“Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications.”

PRISM Break does not recommended S/MIME email encryption because of its reliance on third-party certificates from central authorities. Read more here.
APG has not been updated in three years. Experimental PGP projects worth looking at are OpenPGP Keychain (a APG fork) and GnuPG for Android by the Guardian Project.

Instant messaging

Proprietary

  • AOL Instant Messenger
  • Apple OS X Messages
  • Google Talk
  • Trillian
  • Viber Messenger
  • WhatsApp Messenger
  • Yahoo! Messenger

Free alternatives


  • Pidgin

    Free universal instant messaging client. XMPP OTR


  • Off-the-Record Messaging – OTR

    Install and enable this plugin in Pidgin for encrypted chat.


  • TorChat

    Anonymous P2P chat built on Tor Hidden Services (not sponsored by the Tor Project).

  • IRC

  • BitlBee

    IRC instant messaging gateway that supports a bunch of protocols. XMPP OTR

  • Android

  • Gibberbot

    Private, secure OTR messaging for Android. OTR


  • Xabber

    OTR-encrypted instant messaging for Android. XMPP OTR

  • Apple iOS

  • ChatSecure

    Encrypted IM for iOS devices. OTR

Notes

“Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie–Hellman key exchange, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides perfect forward secrecy and malleable encryption.
The primary motivation behind the protocol was providing deniability for the conversation participants while keeping conversations confidential, like a private conversation in real life, or off the record in journalism sourcing.”

Note that Pidgin stores your IM account passwords in plain text. You can avoid this by (1) not saving your password in Pidgin, (2) encrypting your file system with software like TrueCrypt, or (3) storing your Pidgin password securely with the Debian package pidgin-gnome-keyring.
Pidgin with OTR and dbus enabled has a security bug that can be exploited by malicious programs on your PC. See the upstream bug report for more information and possible workarounds.
The Guardian Project hosts a fantastic how-to guide to chatting securely on Android with Gibberbot.
Threema is not recommend by PRISM Break as it is closed source software. Freely available source code is a necessary condition for privacy and security.

Video conferencing & VoIP

Proprietary

  • FaceTime
  • Google+ Hangouts
  • Google Talk
  • Skype

Free alternatives


  • Jitsi

    Encrypted text, voice, and video messaging for multiple platforms. XMPP SIP


  • Linphone

    Encrypted voice and video chat client for multiple platforms. SIP


  • Mumble

    Encrypted, low-latency multi-user voice chat.

  • Android

  • CSipSimple

    End-to-end encrypted VoIP calls for Android devices. SIP

Notes

Get a free SIP account for Jitsi and/or CSipSimple with The Guardian Project’s Ostel service.
Jitsi warnings: Jitsi may request non-secure information during encrypted chat if you paste a link into it. This can be disabled in “Preferences/Options > Chat > Enable Image/Video replacement”. Also, if Jitsi is set up to use Tor, it may leak DNS information by not using Tor for DNS resolution. Lastly, Jitsi records chat history in unencrypted form. This can be disabled under “Preferences/Options > General > Log chat history”

Social networking

Proprietary

  • Google+
  • Facebook
  • LinkedIn
  • Twitter

Free alternatives

  • Software

  • buddycloud

    Open source, federated social network. XMPP


  • Diaspora

    Community-run, distributed social network. FSF endorsed


  • Friendica

    Privacy respecting, distributed, federated social network.


  • Movim

    Private, decentralized social network server. XMPP


  • pump.io

    Self-hosted social stream server. FSF endorsed

  • Protocol

  • Tent

    Protocol for realtime decentralized communication and personal data storage.

Notes

If you have system administration knowledge, please strongly consider running an instance of pump.io (or something else) for your friends, family, or favorite community. Many of them would be willing and grateful to escape Facebook if you provide them a way out.
For those of you without your own server, RetroShare is the easiest way to start your own encrypted social network.
identi.ca is a popular Twitter-like social networking hub for the free and open source software community built on pump.io.

Cloud storage

Proprietary

  • Apple iCloud
  • Dropbox
  • Google Drive
  • Microsoft SkyDrive

Free alternatives

  • Service

  • MyKolab

    Secure, private Kolab accounts hosted in Switzerland. Full package includes file cloud. paid service

  • Software

  • git-annex assistant

    Synchronize folders on your computers and drives.


  • ownCloud

    Cloud data in your control.


  • Sparkleshare

    Self-hosted version control and file sync. FSF endorsed


  • Tahoe-LAFS

    Free and open cloud storage system. FSF endorsed

Notes

Cloud file storage is also available via Chwala/iRony components of Kolab with the capability to integrate various storage backends. Files are accessible via storage layer access options, WebDAV and Kolab web interface integrating Roundcube.
Tarsnap is not recommended on PRISM Break due to its lack of anonymous payment options and strict copyright on the client that makes it difficult to replace the service in the event Tarsnap is shut down.
BitTorrent Sync, MEGA, and SpiderOak are services that are built on either partially or fully proprietary software. They will not be recommended on PRISM Break until they open source the entirety of their codebase.
With closed source software, you need to have 100% trust in the vendor because there’s nothing except for their morality in the way of them leaking your personal information. Even if you can vouch for their integrity, proprietary software invariably has more uncaught security bugs and exploits because there are fewer eyes examining the source code.
Another alternative to cloud storage is local backup with external hard drives and USB flash drives. This method is reliably more secure than storing data on a network, but comes at a convenience cost.

Document collaboration

Proprietary

  • Google Docs
  • Microsoft Office Web Apps
  • Zoho Office Suite

Free alternatives

  • Service

  • pad.riseup.net

    An etherpad service hosted by Riseup. USA hosted

  • Software

  • etherpad

    Self-hosted, real-time collaborative documents.


  • Ethercalc

    Multi-user spreadsheet server.

Notes

The etherpad project maintains a list of sites that run etherpad services. Please only choose from the services that use SSL, and research the site’s background before trusting them with your data.
Riseup also offers email, XMPP, and chat services, all of which are accessible through Tor Hidden Service addresses. The list of these addresses is available here.

Media publishing

Proprietary

  • Flickr
  • Instagram
  • Picasa
  • Tumblr
  • YouTube
  • Vimeo

Free alternatives

  • Service
  • noblogs
    Noblogs.org

    Blog publishing platform based on WordPress, by autistici.org.

  • MediaCrush
    MediaCrush

    Privacy-first fast media (image, video, audio) hosting. USA hosted

  • Software
  • MediaCrush
    MediaCrush

    You can also run self-hosted instances of MediaCrush.


  • GNU MediaGoblin

    Decentralized media publishing platform. FSF endorsed


  • Piwigo

    Self-hosted photo gallery platform.


  • WordPress

    Self-hosted website publishing platform.


  • Zenphoto

    Self-hosted media management system.

Notes

Self-hosting your media is important for privacy and security. Hosting your blog on WordPress.com is no better for your data security than Blogger or Tumblr.
Warning: Using avatars in WordPress will activate Gravatar, which which will send your email address to gravatar.com. Avatars are activated by default and can be turned off under “Settings > Discussion > Avatars”.
Warning: MediaCrush includes Google Analytics and Google Adsense if you do not have Do Not Track enabled.

Online transactions

Proprietary

  • PayPal
  • Google Wallet

Free alternatives


  • Bitcoin

    P2P digital currency with no central authority.


  • Alternative cryptocurrencies

    List of alternative encrypted digital currencies. beta

Notes

Learn more about Bitcoin and get started with your first free wallet at We Use Coins.

Digital distribution

Proprietary

  • Steam

Free alternatives


  • Desurium

    Free opensource client for the desura distribution service.

Notes

Desurium is only the client. You will still have to trust/depend on the proprietary desura service.

Virtual Private Network (VPN)

Proprietary

  • Cisco Systems VPN Client
  • Viscosity

Free alternatives

  • Service

  • A/I VPN

    Secure personal VPN service provided by Autistici/Inventati. approval required


  • Riseup VPN

    Secure personal VPN service provided by Riseup. USA hosted

  • VPN client

  • OpenVPN

    Free software VPN client.


  • Libreswan

    Free software VPN client 3rd generation derived from Openswan.


  • Openswan

    Free software VPN client derived from FreeS/WAN.


  • strongSwan

    Free software VPN client derived from FreeS/WAN.


  • Tinc

    Free software daemon that uses tunnelling and encryption to create a secure private network

Notes

Encrypted virtual private network (VPN) technology can be used by ordinary Internet users to connect to proxy servers for the purpose of protecting one’s identity and online footprint.
More on Wikipedia.

Web analytics

Proprietary

  • Google Analytics

Free alternatives


  • Piwik

    Open source, self-hosted web analytics.


  • Open Web Analytics

    Alternative open source web analytics.

Notes

DNS provider

Proprietary

  • Google Public DNS

Free alternatives

  • Service

  • CloudNS

    DNS hosting service with DNSCrypt, DNSSec, and Namecoin support.


  • OpenNIC Project

    Open, democratic, and anti-censorship DNS provider.

  • Software

  • DNSCrypt

    A tool to secure communications between a client and a DNS resolver.


  • Namecoin

    Distributed DNS for the .bit TLD based on Bitcoin technology. advanced

Notes

Google Public DNS permanently logs your ISP and location information for analysis. Your IP address is also stored for 24 hours.
OpenNIC has not adopted an official policy concerning log query privacy/anonymization. You may choose anonymous DNS servers on this page.

Anonymizing network

Free alternatives


  • Freenet

    Decentralized censorship-resistant network.


  • I2P

    The invisible internet project.


  • Syndie

    Distributed, anonymous forum software.


  • Tor Hidden Services

    The Tor network offers access to *.onion websites.


  • GNUnet

    GNUnet is a fully free P2P network.

  • Android

  • Nightweb

    Anonymous I2P network for Android and desktop.

Notes

Meshnet

Free alternatives


  • Commotion Wireless

    Uses mobile phones, computers, and wireless routers to create decentralized mesh networks.


  • Project Meshnet

    A decentralized alternative to the internet.


  • freifunk.net

    A non-commercial open grassroots initiative to support free radio networks around the world. German


  • guifi.net

    Open, free and neutral wireless network for everyone.


  • Project Byzantium

    Byzantium is a live Linux distribution that delivers easy-to-use mesh networking.


  • LibreVPN

    A free network that runs over other networks. Spanish

Notes

A meshnet is a decentralized peer-to-peer network, with user-controlled physical links that are usually wireless.
“Mesh networking (topology) is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to propagate the data in the network.”

Server operating system

Proprietary

  • Apple OS X Server
  • Microsoft Windows Server

Free alternatives

  • GNU/Linux

  • CentOS

    Enterprise class computing platform with 100% binary compatbility with RHEL.


  • Debian

    Strictly free, ethical GNU/Linux distribution.


  • SME Server

    Simple distro based on CentOS with preconfigured mail, file sharing, web server, and more.


  • Yunohost

    Personal distribution based on Debian with preconfigured mail, IM, and web server.

  • BSD

  • FreeBSD

    A free BSD-derived operating system.


  • OpenBSD

    A secure BSD operating system. most paranoid

Notes

The only way to have full control over your personal data is to run your own server. This is not for everyone though, as it requires considerable time investment and technical knowledge.

File encryption

Proprietary

  • Apple FileVault
  • BitLocker Drive Encryption
  • McAfee Endpoint Encryption
  • Symantec Drive Encryption

Free alternatives


  • TrueCrypt

    Real-time disk and partition encryption software for multiple platforms.


  • DiskCryptor

    High performance partition encryption software for Windows.


  • dm-crypt

    Transparent disk encryption subsystem included in the GNU/Linux kernel.


  • Linux Unified Key Setup

    LUKS is a convenience and ease-of-use layer for use on top of dm-crypt.


  • EncFS

    File based encryption tool with support for Linux, Mac OS and Windows.


  • geli

    Disk encryption subsystem included in the FreeBSD operating system. BSD

Notes

While TrueCrypt is open source, it is developed in a closed fashion and may receive less review than a comparably openly deveoped project. That said, it is still probably the best option for file encryption on Windows and OS X.
If you’re running GNU/Linux, dm-crypt with LUKS is the recommended encryption option.
Gentoo GNU/Linux maintains a guide for dm-crypt with LUKS.
Arch GNU/Linux maintains a guide to dm-crypt with LUKS. Also useable for Parabola GNU/Linux.

Mail server

  • Google Apps
  • IBM Notes
  • Microsoft Exchange
  • Novell GroupWise

Free alternatives

  • Mail server

  • iRedMail

    Install and configure mail server packages automatically in GNU/Linux and BSD. GPLv2


  • IndiMail

    Highly scalable and configurable messaging platform based on the MTA qmail. GPLv3

  • Groupware server

  • Kolab

    Groupware solution for email, files, calendars, address books and mobile sync. Various FOSS licenses

  • Mail transfer agent (MTA)

  • Exim

    MTA used on approximately 43% of all mail servers—the default on Debian GNU/Linux. GPL


  • Postfix

    Easy-to-setup MTA used by approximately 23% of all mail servers. IBM Public License

Notes

A beginner’s guide to running your own mail server is available here: “NSA-proof your e-mail in 2 hours”.
Kolab integrates Roundcube into its webclient and offers desktop clients as well. Recent versions also feature a file cloud turning it into a complete solution for personal information management.

What is an MTA?
“Within Internet message handling services (MHS), a message transfer agent or mail transfer agent (MTA) or mail relay is software that transfers electronic mail messages from one computer to another using a client–server application architecture. An MTA implements both the client (sending) and server (receiving) portions of the Simple Mail Transfer Protocol.
The terms mail server, mail exchanger, and MX host may also refer to a computer performing the MTA function. The Domain Name System (DNS) associates a mail server to a domain with mail exchanger (MX) resource records containing the domain name of a host providing MTA services.”

XMPP server

Free alternatives

  • Service

  • dukgo.com

    Private XMPP service run on the DuckDuckGo Community Platform—guide included.

  • Software

  • ejabberd

    XMPP server written in Erlang/OTP for GNU/Linux and OS X. GPLv2


  • Openfire

    Cross-platform XMPP server written in Java. Apache


  • Prosody IM

    Flexible XMPP server written in Lua. MIT/X11


  • Tigase

    Cross-platform XMPP server written in Java. GPLv3


  • Metronome IM

    XMPP server based on Prosody, with advanced management/microblogging features. ISC and MIT/X11

Notes

“Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for message-oriented middleware based on XML (Extensible Markup Language). The protocol was originally named Jabber, and was developed by the Jabber open-source community in 1999 for near real-time, instant messaging (IM), presence information, and contact list maintenance. Designed to be extensible, the protocol has also been used for publish-subscribe systems, signalling for VoIP, video, file transfer, gaming, Internet of Things applications such as the smart grid, and social networking services.”

SIP server

Free alternatives

  • Service

  • Ostel

    Secure SIP accounts by the Guardian Project for use with CSipSimple, Jitsi, et al. SIP

  • Software

  • Asterisk

    PBX implementation with VoIP/SIP support. GPLv2


  • FreeSWITCH

    Cross-platform soft switch software with VoIP/SIP support. MPL


  • Kamailio

    Open source VoIP/SIP server. GPL

Notes

“The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.”

Here’s a guide by Asipto to setting up and running your own Skype-like SIP service with Kamailio in under an hour.

Hardware & software setup

Free alternatives


  • FreedomBox

    FreedomBox integrates privacy protection on a cheap plug server so everybody can have privacy.


  • arkOS

    arkOS is a lightweight software stack that runs on a Raspberry Pi to securely self-host your websites, email, files and more.

Notes

What is “free software”?

“Free software” means software that respects users’ freedom and community. Roughly, the users have the freedom to run, copy, distribute, study, change and improve the software. With these freedoms, the users (both individually and collectively) control the program and what it does for them. (more …)
—The Free Software Foundation

Take action against PRISM.

MASSIVE SURVEILLANCE EXPOSED
Recent reports by the Guardian and the Washington Post confirm secret spying programs on phone records and Internet activity. It‘s time for a full accounting of America’s secret spying programs—and an end to unconstitutional surveillance. (more …)
—The Electronic Frontier Foundation

Leave a Reply