If you don’t care about your own privacy it’s proof positive you don’t care about anyone else’s. EVERYONE should be using the SIGNAL app in any app store. No links search and install for free. Unencrypted= postcard, encrypted= coded message in a stamped, sealed envelope. Conversation between parties have the right to privacy.
Safe Practices.
Remember they can prove it’s you speaking, but they can’t prove it’s you typing if you know what you are doing.

If someone has your real phone number & real IP address they have your REAL location. https://www.locationsmart.com/try (dont try) has been illegaly used for years by law enforcement to stalk, harass, parallel construct & entrap citizens with no oversight. It uses cell phone companies location API and gives anyone with an account that they don’t verify documents with to obtain real time location of your cell phone with only the number, no warrant, no due process, no pen register needed. Remove battery & sim on your siloed phone when traveling or at home.
Utilize VPNs & throwaway phones as much as possible.
PSA unfortunately these days if you want your meetings to actually be private, after making arrangements via free, open source, encrypted, text, video, chat, app Signal…..
utilizing faraday cell phone bags 5+ miles/30minutes from destination, removing cell phone battery 5+ miles/30 minutes, from destination, using cigarette lighter cell phone jammer if legal in your locale 5+ miles/30 minutes from destination….AND not powering on 5+ miles/30 minutes after your appointment is over…
Don’t use the camera phone to take pictures, get a separate digital camera…
Android = Replicant, CyanogynMod, & Orbot TOR Browser for secure mobile browsing. RedPhone for encrypted voice, TextSecure for encrypted texting, An App called ChatSecure will encrypt your Google Talk/Hangout/Facebook Chats, Android IMSI Catcher/Detector, PrivateInternetAccessVPN or PROxpn VPN for android. Dolphin Zero Browser, SureSpot FREE another encrypted text option
Blackphone & Cryptophone also have encrypted communication devices available.
Use assumed name for cell phones, internet, websites, utilities…. use Airplane mode wifi only devices when you can. Utilize safety deposit boxes & personal mail boxes, no real address on I.D…..Utilize trusts, 501(c)(3)s, LLCs, DBAs, REITS etc…..Use Cash, Reloadable Green Dot Money Paks, Pre-paid credit cards, & pre paid cell phones when you can. Nexus Phone, Wifi only $249 or Less Nexus 7 Tablet
Never use an email to reply to an ad that you used to post an ad. Use separate email address that you never use for anything else to post ads, delete this email account every 6 months & create a new one, never reply from it. POST ADS & REPLY TO RESPONSES FROM DIFFERENT EMAILS. NEVER USE THESE EMAILS FOR ANYTHING ELSE DELETE & REPLACE EVERY 6 MONTHS.
Make the phone number you use in an ad incoming ONLY never call back or send messages from it, just use the number in ads for receiving texts or voice mails. Use a separate phone number that is not published anywhere online or in ads to communicate with clients.
Never use hotel/public FREE wifi without using a VPN. If you are using someone elses “free” network they can see what pages you visit, EVERYTHING YOU DO, etc….PrivateInternetAccessVPN or ProXPN VPN has a FREE basic account, & the Tiny Hardware Firewall is a portable Hardware VPN solution
Search for hidden cameras when doing outcalls to private homes & even hotel rooms, use a video signal jammer or detector if you can, some people hide cameras to get content to sell or use for blackmail, when webcamming watermark your outgoing video stream or include email or contact info somewhere in frame so footage can be traced back to you if person on otherside of stream is capturing for resale. If they can see you on their screen they can capture the video to sell or post elsewhere. You can Add watermark to outgoing video stream or add watermark to your skype, google hangout, twelephone chat with the following software VidBlaster, Wirecast, WebCamMax, VMix…..
If you are ever at a Vegas Casino & security asks for your I.D., keep walking towards an exit, & say you don’t have it on you. Leave ASAP. Casino security is the equivalent of mall security they cannot detain, touch, or search you without police present. If you give them your I.D. your name & face will be in the i-Trak system whether you are innocent or guilty of anything. It’s best not to be in that system so again say you don’t have it & leave. There is a chance they will get a decent pic from a security cam but it will be under Jane Doe so just leave, there are plenty of other casinos to go visit, just stay away for a while. Approx 3 companies own all the strip casinos so when you’re in 1 system 9 other casinos will have you in their system. Be polite & live to work another day. The longer you can go without being banned from a casino and remain under the radar the better. It’s hard to make money in Vegas when you’re walked out of a casino on site when you’ve just walked in. If you are walking you are also not required to show police your I.D. politely ask if you are free to go, if they say no, you then ask “Am I being detained?” if the answer is no you are free to leave if they say yes, comply with their request for I.D. and let them know you will not answer any questions without a lawyer present. Be polite & remember they are NOT your friends, they are not there to help or protect you.
The only 3 things you EVER have to say to a law enforcement official is.
1. Am I free to go?
2. Am I under arrest?
3. May I speak with an attorney?
Android = Replicant, CyanogynMod, & Orbot TOR Browser for secure mobile browsing. RedPhone for encrypted voice, TextSecure for encrypted texting, An App called ChatSecure will encrypt your Google Talk/Hangout/Facebook Chats, Android IMSI Catcher/Detector, PrivateInternetAccessVPN or PROxpn VPN for android. Dolphin Zero Browser, SureSpot FREE another encrypted text option
Have guests remove cell phone batteries & store mobile devices/ cellphones in stainless steal martini shakers or ss lunch boxes inside refrigerator while visiting. Have guests remove their mobile device batteries 30minutes to 1 hour prior to visiting your location & leave in the car, & wait 30minutes to 1 hour after leaving before powering back on. There are also bags available on Amazon that block cell phone transmission.
Give guest(s) tour of location leave closets, doors, shower curtains open.
Use locations with parking garages common with higher end hotels & airports. If not possible try to have guests park nearby not directly on property within 5 minute walk. Always check in alone. When giving out your location use hotel across the street or nearby, never post actual location in ad only a nearby major intersection or landmark. Try to meet at hotel lounge or floor before giving out your room number.
Use VPNs or TOR while browsing the internet. . See if cell phone / GPS / WiFi / Bluetooth / Video Signal jammers are legal in your area. Apps are what were called spyware, adware, malware decade(s) ago try not to use them place shortcut links to https://website on screen & visit like a webpage.
How to Enable Encryption on Android
Some recent legal rulings have suggested that encryption can protect against warantless searches. The California Supreme Court has ruled that police officers can lawfully search your cell phone without a warrant if it’s taken from you during arrest – but they would require a warrant if it was encrypted. A Canadian court has also ruled that phones can be searched without a warrant as long as they’re unencrypted. (But remember, we’re not lawyers here!)
Encrypting your phone means your files are encrypted at rest when the phone is locked. Any files you send and receive from your phone won’t be encrypted, unless you employ other methods to make them so.—Android = Replicant, CyanogynMod, & Orbot TOR Browser for secure mobile browsing. RedPhone for encrypted voice, TextSecure for encrypted texting, An App called ChatSecure will encrypt your Google Talk/Hangout/Facebook Chats, Android IMSI Catcher/Detector, PrivateInternetAccessVPN or PROxpn VPN for android. Dolphin Zero Browser, SureSpot FREE another encrypted text option , PROxpn VPN for android
The only difference on the user side between an unencrypted and an encrypted phone is that you’ll now have to use a passcode to unlock your phone.
For basic security reasons, you should already have your phone set to ask for such a code before it unlocks, but if you haven’t, this added step might take some getting used to.
On unencrypted phones, this passcode merely locks the screen — it doesn’t do anything to secure the files that are stored on your device. So if attackers find a way around the lock screen, they’ll then have full access to your files.
On an encrypted phone, the passcode is the key that decrypts your encrypted files, kind of like a key opens a lockbox.
When your phone is locked, the encryption is in place, so even if attackers get around the lock screen all they’ll find is the scrambled data that encrypted files appear as.
1. Open up your Settings menu. You can do this by tapping the menu button on the lower left of the phone, and then tapping Settings.
2. In Settings, go to Security. You’ll find this selection under the More tab at the top of the screen in Android 4.2.2 and other recent versions.
3. Under Security, tap Encrypt Device. At this point, you’ll be prompted to enter a passphrase of at least six characters, at least one of which is a number.
Once you decide on a passcode, your phone will start the process of encrypting your files. This can take an hour or more, so you should plug in your phone charger before you start.
Once the encryption process is complete you’re done! Be sure to store your passcode in a safe place, as you’ll now need it to access your phone and there’s no way to recover a forgotten password.
All Custom Notebooks & PCs come fully encrypted with the hard drives pre partitioned, & Triple Boot Capabilities. You will be able to boot into multiples OS’s (Operating Systems) We use Windows 7 & 8 64Bit Home Premium & the newest version of Linux Mint . Copies of Linux Liberte & Linux Tails are included with your PC They can be run off a disc or a usb drive as back up Os’s . A full format is performed on all hard drives before custom installs and a full defrag with MyDefrag is performed after updates and custom installs so data is continuous on your drive (Not performed on systems with SSDs (Solid State Drives). All other Top Notch products & gadgets are updated with the newest firmware available before shipped to optimize performance.
Security / Safety / Privacy
Notebooks, Desktops, Gadgets should be fully wiped or have a Full Format performed on them at least once every 6 months with a fresh Re Install to protect against 0 day exploits, key loggers, root kits, & HID attacks via devices like the USB Rubber Ducky
Security / Safety / Privacy
TopNotch Custom Notebooks & PCs ship with Windows Update Fully Updated along with the following Safety & Security Software Installed. Windows Security Essentials AntiVirus, MalwareBytes, SpyWare Blaster, Spy Bot Search & Destroy, CryptoPrevent, CCleaner Slim, HiJack This, MalwareBytes Anti Root Kit, Deep Freeze, along with a shortcut link to erase Flash Cookies. They are all conveniently located in a safety folder on the desktop.
Security / Safety / Privacy – the only programs you should need.
All TopNotch Custom Notebooks & PCs come with the following Web Browsers installed all will be the most current versions of Internet Explorer , Mozilla Firefox TopNotch PCs also come with the TOR browser bundle for anonymous browsing as well as DuckDuckGo as default anonymous search, don’t forget OpenStreetMaps & BitMessage for encrypted email. CryptoCat for encrypted chat in your browser. BitTorrent Sync (Works with Windows Android Linux Apple) for encrypted file/message sharing. A VPN should be used when browsing the web OpenVPN is FREE some paid easy to use options include PrivateInternetAccess VPN, ProXPN VPN, Hamachi LogMeIn for remote access, the Tiny Hardware Firewall is a portable Hardware VPN. All TopNotch PC browsers switch DNS servers to the OpenNic project for a private DNS.
Security / Safety / Privacy… Must Have FireFox Extensions:
UBlock Ad Blocker, Random Agent Spoofer, HTTPS Everywhere, Privacy Badger, Disconnect disables 3rd party tracking, NoScript, Request Policy, Self Destructing Cookies, Calomel SSL Validation, Decentraleyes, PoliceMan, DuckDuck Go, Do Not Track Me, CryptoCat, Ghostery, Mailvelope, Click & Clean, Security / Safety / Privacy… Must Have FireFox Extensions
All Custom Notebooks & PCs also come with the following software programs installed Windows Live Essentials, Paint.net, ImgBurn, SlySoft Virtual CloneDrive, KLite Codec Pack with Media Player Classic, VLC Player, DVD Decrypter, DVD Shrink, Foobar Music Player, Pidgin Instant Message Chat Client with OTR PIDGIN encryption, Open Office, Microsoft Office 365 Web Apps, Google Docs, Exact Audio Copy, Audacity, Lame Mp3 Encoder, AutoGK, VobSub, DivX codec/Web Player, The latest version of Silverlight, Flash, Air, & Quicktime, 7Zip, Jitsi Encrypted text & video chat (Skype/Facetime/Hangouts alternative),Mumble encrypted voice audio only chat, File Renamer Basic, DirPrint, Foxit PDF reader, Tor for anonymous web surfing, TrueCrypt if you wish to encrypt your hard drive or files, BitCoin Anonymous virtual crypto currency Trade BitCoins for anonymous no middlemen transactions, Calibre to convert your ebooks for ebook readers, PS3 Media Server, PDAnet to tether Android phones via usb, & SubAir along with a free 90 day subscription to the TopNotch Radio Netcast…..
You can Add watermark to outgoing video stream or add watermark to your skype, google hangout, twelephone chat with the following software VidBlaster, Wirecast, WebCamMax, VMix…..
There will be a software folder which includes all of the above mentioned install files along with image files of the latest Linux Mint OS, Linux Ubuntu OS, Dban (Darik’s Boot & Nuke) to completely wipe hard drives for resale or disposal, Kali Linux (Back Track Linux replacement), and a back up image of your system if you ever need to restore.. WireShark for WiFi Network Protocol analyzer.WiFi Pineapple Hot-Spot Honeypot Pen-Testing Platform, Scappy packet analyzer. DNSRU, AirCrack-ng WEP and WPA-PSK key cracking program, These are all stored on the separate partition.
TopNotch Custom Notebooks can also be configured with the following software programs for an additional fee as the software is not free. Microsoft Office 15 , Adobe CS5 Products, Adobe Photoshop Elements, Winrar, Sony Vegas, Ulead…..Other software packages available just ask and we will send a price quote.
Crummey Trusts Aren’t Crummey NBA We Still Return 20%
Firefox: Privacy Related “about:config” Tweaks
Preparation:
- Enter “about:config” in the firefox address bar and press enter.
- Press the button “I’ll be careful, I promise!”
- Follow the instructions below…
Getting started:
- privacy.trackingprotection.enabled = true
- This is Mozilla’s new built in tracking protection.
- geo.enabled = false
- Disables geolocation.
- browser.safebrowsing.phishing.enabled = false
- Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
- browser.safebrowsing.malware.enabled = false
- Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
- dom.event.clipboardevents.enabled = false
- Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
- network.cookie.cookieBehavior = 1
- Disable cookies
- 0 = Accept all cookies by default
- 1 = Only accept from the originating site (block third party cookies)
- 2 = Block all cookies by default
- network.cookie.lifetimePolicy = 2
- cookies are deleted at the end of the session
- 0 = Accept cookies normally
- 1 = Prompt for each cookie
- 2 = Accept for current session only
- 3 = Accept for N days
- browser.cache.offline.enable = false
- Disables offline cache.
- browser.send_pings = false
- The attribute would be useful for letting websites track visitors’ clicks.
- webgl.disabled = true
- WebGL is a potential security risk. Source
- dom.battery.enabled = false
- Website owners can track the battery status of your device. Source
- browser.sessionstore.max_tabs_undo = 0
- Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
Related Information
- ffprofile.com – Helps you to create a Firefox profile with the defaults you like.
- mozillazine.org – Security and privacy-related preferences.
- user.js Firefox hardening stuff – This is a user.js configuration file for Mozilla Firefox that’s supposed to harden Firefox’s settings and make it more secure.
- Privacy Settings – A Firefox addon to alter built-in privacy settings easily with a toolbar panel.
How to Enable Encryption on Android
Encryption may take an hour or even longer, depending on how much data you have on your device. Plug in your phone and ensure you have enough time before continuing. If you have to interrupt the encryption process, you’ll lose some (or all!) of the data on your phone.
Before you continue, ensure you have a lock screen PIN or password set up. Android won’t allow you to encrypt your device until you create a PIN or password. To set one up if you haven’t already done so, open your device’s Settings screen, tap Security, tap Screen Lock, tap PIN or Password, and set up a new PIN or password.

You can now encrypt your Android phone’s storage. Open its Settings screen, tap Security, and tap Encrypt phone (or Encrypt tablet) under Encryption.

Read the warning information and tap the Encrypt phone button to continue. You’ll see a message telling you to plug in your phone if it’s not plugged in yet.

You’ll have to provide the lock-screen PIN or password to continue with the encryption process. Agree to the warning and then leave your phone alone for a while – it may take an hour or more. Don’t interrupt the phone while it’s encrypting its storage.
(When we tried this on a Nexus 4 running Android 4.2.2, our phone just rebooted itself instead of beginning the encryption process. We got around this apparent bug by trying again several times. If your phone reboots itself, try initiating the encryption process again and keep trying until it works. We had to try three times on our Nexus 4 before it worked.)

You’ll see a progress indicator appear. After it’s done, your device’s storage will be encrypted. You’ll have to enter the PIN or password each time you boot your phone or its storage will be unreadable, so don’t forget the password! If you do, you can only remove the encryption by performing a factory reset.
If you used a PIN instead of a password, you’ll get a password prompt anyway. Just enter the PIN number using the numeric keyboard.
courtesy of http://prism-break.org
Operating system
Proprietary
Apple OS X
Google Chrome OS
Microsoft Windows
Free alternatives
- GNU/Linux
-

Debian
Strictly free, ethical GNU/Linux distribution. most stable
-

Fedora
Fast, stable and powerful GNU/Linux distribution. most cutting edge
-

Gentoo
GNU/Linux distribution about choice, control and security. most advanced features
-

Linux Mint Debian Edition
Comfortable and easy-to-use GNU/Linux distribution based on Debian. friendly defaults
-

openSUSE
Stable, easy-to-use multi-purpose GNU/Linux distribution. easiest to use
- BSD
-

OpenBSD
A secure BSD operating system. most paranoid
Notes
Debian has a long tradition of software freedom. Contributers have to sign a social contract and adhere to the ethical manifesto. Strict inclusion guidelines make sure that only certified open source software gets packaged in the main repositories.
Gentoo describes itself as a meta-distribution. The source code is compiled to binary applications on the user’s machine allowing near-unlimited adaptability and complete retraceability of the program logic.
Linux Mint Debian Edition (LMDE) is probably the easiest-to-use distribution for people migrating from Microsoft Windows. However, note that LMDE does not support full disk encryption.
Both Fedora and openSUSE are community editions that serve as the stable basis for enterprise ready GNU/Linux distributions with commercial support. Companies all over the world trust Red Hat Inc. and SUSE Linux GmbH because of their transparency throughout the whole development process.
Canonical’s Ubuntu is not recommended by PRISM Break because it contains Amazon ads and data leaks by default. GNU/Linux distributions based on Ubuntu are also currently not recommended due to several other reasons.
Live CDs & VM images
Free alternatives
-

Liberté Linux
Live CD/USB based on Hardened Gentoo designed as a communication aid in hostile environments.
-

Tails
Live CD/USB based on Debian and Tor aimed at preserving your privacy and anonymity.
-

JonDo
Live CD/USB based on Debian with pre-configured tools for anonymous surfing and more.
-

Whonix
VM-friendly OS based on Debian and Tor focused on anonymity, privacy and security.
Notes
A virtual machine (VM) image like Whonix is designed to be run inside of a virtualization package like VirtualBox. VirtualBox can be installed on Windows, Linux, OS X, and Solaris. This means that if you’re stuck using Windows or OS X for whatever reason, you can install VirtualBox and use Whonix to increase your privacy and security.
Android
Proprietary
Google Android
Google Play
Free alternatives
-
Operating system
-

CyanogenMod
Aftermarket firmware for Android devices.
-

Replicant
Fully free Android distribution based on CyanogenMod. FSF endorsed
-

Firefox OS
Free and open source operating system for Android-compatible devices.
-
Digital distribution
-

F-Droid
Free and open source alternative to the Google Play app store for Android. FSF endorsed
Notes
CyanogenMod licensing:
“CyanogenMod does still include various hardware-specific code, which is also slowly being open-sourced anyway.”
Google Apps for Android (Gapps) are the proprietary applications by Google that come pre-installed with most Android devices. After flashing your firmware with either Cyanogenmod or Replicant, safeguard your data by not re-installing Google Apps on your phone.
Uninstall Gapps from any firmware with this guide by ciddaemon.
iOS & WP
Proprietary
Apple iOS
Microsoft Windows Phone
Free alternatives
Notes
Web browser
Proprietary
Apple Safari
Google Chrome
Microsoft Internet Explorer
Opera
Free alternatives
- IP hidden
-

Tor Browser Bundle
Encrypted, anonymous web browsing powered by the Tor network.
-

JonDonym
Private browsing with the JonDo IP anonymization service and JonDoFox profile for Firefox.
- IP exposed
-

Mozilla Firefox
Fast, flexible and secure web browser with a vibrant add-on ecosystem.
- Android
-

Orbot
The features and functionality of Tor for Android.
- Apple iOS
-

Onion Browser
Surf the web through the Tor network with this open source browser for iOS devices. paid software
Notes
TBB notes: Using the TBB to sign into websites that contain your real ID is counterproductive, and may trip the site’s fraud protection. Make sure to check for HTTPS before signing in to a website through Tor. Signing into HTTP websites can result in your ID being captured by a Tor exit node.
Firefox notes: This browser uses Google search by default: replace it with a more private alternative. Another debranded alternative to Firefox is Iceweasel, a browser for Debian-based distributions.
Why are Chromium, SRWare Iron, et al. not recommended on PRISM Break? More info here.
Warning for mobile devices & Tor: Websites using HTML5 <video> tags will leak <video>-related DNS queries and data transfer outside of Tor.
Why are privacy- and security-enhancing addons for proprietary browsers not listed?
Because the improvements they may achieve can not be significant in the context of their untrustworthy host browser. Switching to a free, open-source browser like Firefox achieves better improvements.
Web browser add-ons
Free alternatives
- Privacy & security

Adblock Edge
Block advertisements and trackers across the web with filter subscriptions.

Disconnect
Visualize and block invisible tracking of your search and browsing history.

HTTPS Everywhere
Encrypt your communications from thousands of websites by enforcing HTTPS everywhere.

NoScript
Only enable JavaScript, Java, and Flash for sites you trust. advanced

RequestPolicy
Control which cross-site requests are allowed by sites you visit. advanced
- Instant messaging

CryptoCat
Private and encrypted instant messaging within the web browser. OTR
- Email encryption

Mailvelope
OpenPGP email encryption tool for major webmail services. PGP beta
Notes
If you’re using a Firefox-based browser, you can safeguard your browsing habits and stop advertising companies from tracking you by installing Adblock Edge, Disconnect, and HTTPS Everywhere.
Install NoScript and enable ‘Forbid scripts globally’ to improve the security of your browser by preventing 0day JavaScript attacks. This is a drastic option as it will render many websites unusable as they rely heavily on JavaScript. NoScript offers a whitelist you can use to selectively enable JavaScript for sites you trust, but this is considered especially bad for your anonymity if you’re using NoScript with Tor.
Why is Adblock Plus not recommended? Adblock Plus shows “acceptable ads” by default, which works against the purpose of the add-on. Either disable acceptable ads or use the Adblock Edge fork instead.
Ghostery is an alternative anti-tracker add-on to Disconnect. While the code is available, the license is currently proprietary.
TheRequestPolicy-addon offers a 1.x beta release channel which enables default policies and subscriptions. Activating “Block requests by default”, “Allow requests to the same domain” combined with some “Usability” subscriptions should yield a largely undisturbed surfing experience, while blocking most trackers.
Web search
Proprietary
-
Google Search
Microsoft Bing
Yahoo! Search
Free alternatives
Notes
There is also a DuckDuckGo hidden service at 3g2upl4pq6kufc4m.onion for Tor users.
MetaGer is a SaaS by the German non-profit SUMA e.V. that provides you with anonymous meta search results.
Startpage is a SaaS hosted in the USA and the Netherlands that provides you with anonymous Google search and image results through a free proxy.
Ixquick (run by the same company as Startpage) is a meta search engine that returns combined results from nearly 100 sources – excluding Google.
YaCy is a promising project that offers fully decentralized peer-to-peer search. The more people who start using it, the better the results will become.
Maps
Proprietary
Apple Maps-
Google Maps
Google Earth
Microsoft Bing Maps
Yahoo! Maps
Free alternatives
Notes
“If you spend time contributing to OpenStreetMap you are helping a good cause, and building a geographic database of the world which is free and open for all and forever.”
Email service
Proprietary
Google Gmail
Microsoft Outlook.com
Yahoo! Mail
Free alternatives
- Service

Autistici/Inventati
A full range of privacy-aware services including hosting, VPNs, email, IM, and more. approval required

MyKolab
Secure, private Kolab accounts hosted in Switzerland. Email from 4.85 CHF, full groupware from 9.70 CHF per month. paid service

Riseup
Secure communication tools for people working on liberatory social change. invitation required USA hosted
- Peer to peer software

Bitmessage
Encrypted, decentralized P2P messaging service based on Bitcoin technology. beta

RetroShare
Secure P2P communications platform offering IM, forums, VoIP, file sharing, and more. PGP
Notes
MyKolab is hosted in Switzerland and benefits from the strong Swiss privacy laws. It is run exclusively with free software and using the service supports the development of Kolab. Also, it lets you export all your data at any time.
Riseup’s services may also be accessed via their Tor Hidden Service addresses. A list is available here.
Bitmessage is a promising alternative to email, but it has not yet been audited by security professionals. Use at your own risk. If you decide to try out Bitmessage, make sure to generate a completely random ID to greatly reduce the probability of ID collisions.
RetroShare has not been thoroughly audited by security professionals for possible security issues.
Why not Hushmail? See ‘compromises to email privacy’.
If you have the technical aptitude, consider running your own mail server.
Email client
Proprietary
Apple OS X Mail
Microsoft Office Outlook
Free alternatives

Mozilla Thunderbird
Multi-platform email application with mail encryption through the Enigmail add-on.

Enigmail
OpenPGP email encryption add-on for Thunderbird and Icedove. PGP
-

TorBirdy
Add-on that makes Thunderbird and Icedove connect through Tor. experimental

Claws Mail
Lightweight, featureful email application for multiple platforms with built-in PGP support. PGP

Sylpheed
Lightweight, user-friendly email application for multiple platforms with built-in PGP support. PGP
- Android

K-9 Mail
Email application for Android devices with built-in PGP support. PGP
Notes
The second step is getting you and your contacts to encrypt your plain text messages with PGP encryption. This section contains free email clients that support PGP.
Here is a guide by Security In A Box to encrypting your email with Mozilla Thunderbird, GNU Privacy Guard (GPG), and Enigmail.
Find out more about the differences between Mozilla Thunderbird and Icedove.
Email encryption
Free alternatives
Notes
“Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications.”
PRISM Break does not recommended S/MIME email encryption because of its reliance on third-party certificates from central authorities. Read more here.
APG has not been updated in three years. Experimental PGP projects worth looking at are OpenPGP Keychain (a APG fork) and GnuPG for Android by the Guardian Project.
Instant messaging
Proprietary
AOL Instant Messenger
Apple OS X Messages-
Google Talk
Trillian
Viber Messenger
WhatsApp Messenger
Yahoo! Messenger
Free alternatives

Pidgin
Free universal instant messaging client. XMPP OTR

Off-the-Record Messaging – OTR
Install and enable this plugin in Pidgin for encrypted chat.

TorChat
Anonymous P2P chat built on Tor Hidden Services (not sponsored by the Tor Project).
- IRC

BitlBee
IRC instant messaging gateway that supports a bunch of protocols. XMPP OTR
- Android

Gibberbot
Private, secure OTR messaging for Android. OTR

Xabber
OTR-encrypted instant messaging for Android. XMPP OTR
- Apple iOS

ChatSecure
Encrypted IM for iOS devices. OTR
Notes
“Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie–Hellman key exchange, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides perfect forward secrecy and malleable encryption.
The primary motivation behind the protocol was providing deniability for the conversation participants while keeping conversations confidential, like a private conversation in real life, or off the record in journalism sourcing.”
Note that Pidgin stores your IM account passwords in plain text. You can avoid this by (1) not saving your password in Pidgin, (2) encrypting your file system with software like TrueCrypt, or (3) storing your Pidgin password securely with the Debian package pidgin-gnome-keyring.
Pidgin with OTR and dbus enabled has a security bug that can be exploited by malicious programs on your PC. See the upstream bug report for more information and possible workarounds.
The Guardian Project hosts a fantastic how-to guide to chatting securely on Android with Gibberbot.
Threema is not recommend by PRISM Break as it is closed source software. Freely available source code is a necessary condition for privacy and security.
Video conferencing & VoIP
Proprietary
FaceTime-
Google+ Hangouts
-
Google Talk
Skype
Free alternatives
Notes
Jitsi warnings: Jitsi may request non-secure information during encrypted chat if you paste a link into it. This can be disabled in “Preferences/Options > Chat > Enable Image/Video replacement”. Also, if Jitsi is set up to use Tor, it may leak DNS information by not using Tor for DNS resolution. Lastly, Jitsi records chat history in unencrypted form. This can be disabled under “Preferences/Options > General > Log chat history”
Cloud storage
Proprietary
Apple iCloud
Dropbox
Google Drive
Microsoft SkyDrive
Free alternatives
- Service

MyKolab
Secure, private Kolab accounts hosted in Switzerland. Full package includes file cloud. paid service
- Software

git-annex assistant
Synchronize folders on your computers and drives.

ownCloud
Cloud data in your control.

Sparkleshare
Self-hosted version control and file sync. FSF endorsed

Tahoe-LAFS
Free and open cloud storage system. FSF endorsed
Notes
Tarsnap is not recommended on PRISM Break due to its lack of anonymous payment options and strict copyright on the client that makes it difficult to replace the service in the event Tarsnap is shut down.
BitTorrent Sync, MEGA, and SpiderOak are services that are built on either partially or fully proprietary software. They will not be recommended on PRISM Break until they open source the entirety of their codebase.
With closed source software, you need to have 100% trust in the vendor because there’s nothing except for their morality in the way of them leaking your personal information. Even if you can vouch for their integrity, proprietary software invariably has more uncaught security bugs and exploits because there are fewer eyes examining the source code.
Another alternative to cloud storage is local backup with external hard drives and USB flash drives. This method is reliably more secure than storing data on a network, but comes at a convenience cost.
Document collaboration
Proprietary
Google Docs
Microsoft Office Web Apps
Zoho Office Suite
Free alternatives
Notes
Riseup also offers email, XMPP, and chat services, all of which are accessible through Tor Hidden Service addresses. The list of these addresses is available here.
Media publishing
Proprietary
-
Flickr
-
Instagram
Picasa-
Tumblr
-
YouTube
Vimeo
Free alternatives
- Service

Noblogs.org
Blog publishing platform based on WordPress, by autistici.org.

MediaCrush
Privacy-first fast media (image, video, audio) hosting. USA hosted
- Software

MediaCrush
You can also run self-hosted instances of MediaCrush.

GNU MediaGoblin
Decentralized media publishing platform. FSF endorsed

Piwigo
Self-hosted photo gallery platform.

WordPress
Self-hosted website publishing platform.

Zenphoto
Self-hosted media management system.
Notes
Warning: Using avatars in WordPress will activate Gravatar, which which will send your email address to gravatar.com. Avatars are activated by default and can be turned off under “Settings > Discussion > Avatars”.
Warning: MediaCrush includes Google Analytics and Google Adsense if you do not have Do Not Track enabled.
Online transactions
Proprietary
PayPal-
Google Wallet
Free alternatives
Notes
Digital distribution
Proprietary
Steam
Notes
Virtual Private Network (VPN)
Proprietary
Cisco Systems VPN Client
Viscosity
Free alternatives
- Service

A/I VPN
Secure personal VPN service provided by Autistici/Inventati. approval required

Riseup VPN
Secure personal VPN service provided by Riseup. USA hosted
- VPN client

OpenVPN
Free software VPN client.

Libreswan
Free software VPN client 3rd generation derived from Openswan.

Openswan
Free software VPN client derived from FreeS/WAN.

strongSwan
Free software VPN client derived from FreeS/WAN.

Tinc
Free software daemon that uses tunnelling and encryption to create a secure private network
Notes
More on Wikipedia.
Web analytics
Proprietary
-
Google Analytics
Free alternatives
Notes
DNS provider
Proprietary
-
Google Public DNS
Free alternatives
- Service
-

CloudNS
DNS hosting service with DNSCrypt, DNSSec, and Namecoin support.
-

OpenNIC Project
Open, democratic, and anti-censorship DNS provider.
- Software
-

DNSCrypt
A tool to secure communications between a client and a DNS resolver.
-

Namecoin
Distributed DNS for the .bit TLD based on Bitcoin technology. advanced
Notes
OpenNIC has not adopted an official policy concerning log query privacy/anonymization. You may choose anonymous DNS servers on this page.
Anonymizing network
Free alternatives

Freenet
Decentralized censorship-resistant network.

I2P
The invisible internet project.

Syndie
Distributed, anonymous forum software.
-

Tor Hidden Services
The Tor network offers access to *.onion websites.
-

GNUnet
GNUnet is a fully free P2P network.
- Android

Nightweb
Anonymous I2P network for Android and desktop.
Notes
Meshnet
Free alternatives
-

Commotion Wireless
Uses mobile phones, computers, and wireless routers to create decentralized mesh networks.
-

Project Meshnet
A decentralized alternative to the internet.
-

freifunk.net
A non-commercial open grassroots initiative to support free radio networks around the world. German
-

guifi.net
Open, free and neutral wireless network for everyone.
-

Project Byzantium
Byzantium is a live Linux distribution that delivers easy-to-use mesh networking.
-

LibreVPN
A free network that runs over other networks. Spanish
Notes
A meshnet is a decentralized peer-to-peer network, with user-controlled physical links that are usually wireless.
“Mesh networking (topology) is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to propagate the data in the network.”
Server operating system
Proprietary
Apple OS X Server
Microsoft Windows Server
Free alternatives
- GNU/Linux
-

CentOS
Enterprise class computing platform with 100% binary compatbility with RHEL.
-

Debian
Strictly free, ethical GNU/Linux distribution.
-

SME Server
Simple distro based on CentOS with preconfigured mail, file sharing, web server, and more.
-

Yunohost
Personal distribution based on Debian with preconfigured mail, IM, and web server.
- BSD
-

FreeBSD
A free BSD-derived operating system.
-

OpenBSD
A secure BSD operating system. most paranoid
Notes
File encryption
Proprietary
Apple FileVault
BitLocker Drive Encryption
McAfee Endpoint Encryption
Symantec Drive Encryption
Free alternatives
-

TrueCrypt
Real-time disk and partition encryption software for multiple platforms.
-

DiskCryptor
High performance partition encryption software for Windows.
-

dm-crypt
Transparent disk encryption subsystem included in the GNU/Linux kernel.
-

Linux Unified Key Setup
LUKS is a convenience and ease-of-use layer for use on top of dm-crypt.
-

EncFS
File based encryption tool with support for Linux, Mac OS and Windows.
-

geli
Disk encryption subsystem included in the FreeBSD operating system. BSD
Notes
If you’re running GNU/Linux, dm-crypt with LUKS is the recommended encryption option.
Gentoo GNU/Linux maintains a guide for dm-crypt with LUKS.
Arch GNU/Linux maintains a guide to dm-crypt with LUKS. Also useable for Parabola GNU/Linux.
Mail server
-
Google Apps
IBM Notes
Microsoft Exchange
Novell GroupWise
Free alternatives
- Mail server

iRedMail
Install and configure mail server packages automatically in GNU/Linux and BSD. GPLv2
-

IndiMail
Highly scalable and configurable messaging platform based on the MTA qmail. GPLv3
- Groupware server

Kolab
Groupware solution for email, files, calendars, address books and mobile sync. Various FOSS licenses
- Mail transfer agent (MTA)
-

Exim
MTA used on approximately 43% of all mail servers—the default on Debian GNU/Linux. GPL
-

Postfix
Easy-to-setup MTA used by approximately 23% of all mail servers. IBM Public License
Notes
Kolab integrates Roundcube into its webclient and offers desktop clients as well. Recent versions also feature a file cloud turning it into a complete solution for personal information management.
What is an MTA?
“Within Internet message handling services (MHS), a message transfer agent or mail transfer agent (MTA) or mail relay is software that transfers electronic mail messages from one computer to another using a client–server application architecture. An MTA implements both the client (sending) and server (receiving) portions of the Simple Mail Transfer Protocol.
The terms mail server, mail exchanger, and MX host may also refer to a computer performing the MTA function. The Domain Name System (DNS) associates a mail server to a domain with mail exchanger (MX) resource records containing the domain name of a host providing MTA services.”
XMPP server
Free alternatives
- Service
-

dukgo.com
Private XMPP service run on the DuckDuckGo Community Platform—guide included.
- Software
-

ejabberd
XMPP server written in Erlang/OTP for GNU/Linux and OS X. GPLv2
-

Openfire
Cross-platform XMPP server written in Java. Apache
-

Prosody IM
Flexible XMPP server written in Lua. MIT/X11
-

Tigase
Cross-platform XMPP server written in Java. GPLv3
-

Metronome IM
XMPP server based on Prosody, with advanced management/microblogging features. ISC and MIT/X11
Notes
“Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for message-oriented middleware based on XML (Extensible Markup Language). The protocol was originally named Jabber, and was developed by the Jabber open-source community in 1999 for near real-time, instant messaging (IM), presence information, and contact list maintenance. Designed to be extensible, the protocol has also been used for publish-subscribe systems, signalling for VoIP, video, file transfer, gaming, Internet of Things applications such as the smart grid, and social networking services.”
SIP server
Free alternatives
Notes
“The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.”
Here’s a guide by Asipto to setting up and running your own Skype-like SIP service with Kamailio in under an hour.
Hardware & software setup
Free alternatives
Notes
What is “free software”?
“Free software” means software that respects users’ freedom and community. Roughly, the users have the freedom to run, copy, distribute, study, change and improve the software. With these freedoms, the users (both individually and collectively) control the program and what it does for them. (more …)
—The Free Software Foundation
Take action against PRISM.
MASSIVE SURVEILLANCE EXPOSED
Recent reports by the Guardian and the Washington Post confirm secret spying programs on phone records and Internet activity. It‘s time for a full accounting of America’s secret spying programs—and an end to unconstitutional surveillance. (more …)
—The Electronic Frontier Foundation




























Social networking
Proprietary
Free alternatives
buddycloud
Open source, federated social network. XMPP
Diaspora
Community-run, distributed social network. FSF endorsed
Friendica
Privacy respecting, distributed, federated social network.
Movim
Private, decentralized social network server. XMPP
pump.io
Self-hosted social stream server. FSF endorsed
Tent
Protocol for realtime decentralized communication and personal data storage.
Notes
For those of you without your own server, RetroShare is the easiest way to start your own encrypted social network.
identi.ca is a popular Twitter-like social networking hub for the free and open source software community built on pump.io.