Posts by Category: Privacy Resources

Orbot – Proxy with Tor

August 16, 2013

Orbot – Proxy with Tor
https://play.google.com/store/apps/details?id=org.torproject.android&hl=en

Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Orbot is the only app that creates a truly private internet connection. As the New York Times writes, “when a communication arrives from Tor, you can never know where or whom it’sfrom.” Tor won the 2012 Electronic Frontier Foundation (EFF) Pioneer award. Orbot is the safest way to use the Internet on Android. Period. Orbot bounces your encrypted traffic several times through computers around the world, instead of connecting you directly like VPNs and proxies. This process takes a little longer, but the strongest privacy and identity protection available is worth the wait. This will be added to Privacy Resources Subject Tracer™.

1412 views

TextSecure Private SMS/MMS

August 15, 2013

TextSecure Private SMS/MMS
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms

TextSecure encrypts your text messages over the air and on your phone. It’s almost identical to the normal text messaging application, and is just as easy to use. TextSecure Provides: a) A secure and private replacement for the default text messaging app; b) All messages are encrypted locally, so if your phone is lost or stolen, your messages will be safe; c) Messages to other TextSecure users are encrypted over the air, protecting your communication in transit; and d) TextSecure is Free and Open Source, enabling anyone to verify its security by auditing the code. TextSecure is the only Android private SMS/MMS messenger replacement that uses open source peer-reviewed cryptographic protocols to keep your messages safe. Rather than simply pretending to hide your texts by putting them in another place, TextSecure uses cryptography to ensure that they remain truly secure. This will be added to Privacy Resources Subject Tracer™.

1816 views

Project Tox – Secure Messaging For Everyone

August 14, 2013

“/>

Project Tox – Secure Messaging For Everyone
http://tox.im/

Project Tox, also known as Tox, is a FOSS (Free and Open Source Software) instant messaging application aimed to replace Skype. With the rise of governmental monitoring programs, Tox aims to be an easy to use, all-in-one communication platform (including audio, and videochats in the future) that ensures their users full privacy and secure message delivery. Tox is built with the idea that you can keep up with friends and family without having your privacy violated. While other big-name services require you to pay to unlock features, Tox is free in both price, and in liberty. That is, you’re free to do whatever you wish with Tox. Instant messaging, video conferencing, and more …. This will be added to Privacy Resources Subject Tracer™.

1753 views

OpenNet Initiative

August 08, 2013

OpenNet Initiative
https://opennet.net/

The OpenNet Initiative is a collaborative partnership of three institutions: the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group (Ottawa). Their aim is to investigate, expose and analyze Internet filtering and surveillance practices in a credible and non-partisan fashion. They intend to uncover the potential pitfalls and unintended consequences of these practices, and thus help to inform better public policy and advocacy work in this area. To achieve these aims, the ONI employs a unique multi-disciplinary approach that includes: a) Development and deployment of a suite of technical enumeration tools and core methodologies for the study of Internet filtering and surveillance; b) Capacity-building among networks of local advocates and researchers; and c) Advanced studies exploring the consequences of current and future trends and trajectories in filtering and surveillance practices, and their implications for domestic and international law and governance regimes. This will be added to Privacy Resources Subject Tracer™ Information Blog.

1435 views

Hide My Ass – Free Web Proxy

August 01, 2013

Hide My Ass – Free Web Proxy
http://hidemyass.com/

In this day and age of hackers, censorship, online identity theft, people spying and monitoring your online activities, your online privacy has never been so important. Their aim is to provide easy to use services that help protect your online identity and privacy. Their free web proxy is a secure service that allows you to surf anonymously online in complete privacy. Use their free proxy to surf anonymously online, hide your IP address, secure your internet connection, hide your internet history, and protect your online identity. For more advanced features their Pro VPN service adds increased security and anonymity on to your existing internet connection. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

5434 views

Crypton – Framework for Building Cryptographically Secure Cloud Applications

July 30, 2013

Crypton – Framework for Building Cryptographically Secure Cloud Applications
https://crypton.io/

Crypton is a framework for building cryptographically secure cloud applications. Such applications offer meaningful privacy assurance to end users because the servers running the application cannot read the data created and stored by the application. Using Crypton, developers can for the first time easily build feature rich multi user collaborative applications that offer total privacy and security “out of the box.” Crypton transparently does all the hard parts of cryptography behind the scenes. This allows developers to focus on domain specific challenges. This will be added to Privacy Resources Subject Tracer™. This will be added to Grid, Distributed and Cloud Computing Resources Subject Tracer™.

1968 views

NoteShred – Send Encrypted, Password Protected Notes That Automatically Shred After Reading

July 29, 2013


NoteShred – Send Encrypted, Password Protected Notes That Automatically Shred After Reading
https://www.noteshred.com/

Stop sending sensitive information in plain text. Encrypted email is a pain. Send an online, encrypted, password protected note instead and be notified after it’s been read and shred. The idea behind NoteShred is simple. You create a note, assign it a password and then select how and when you would like the note to “shred” itself. The note has a unique URL that you can send to a recipient along with a password for them to open the note. You decide when the note will destroy or “shred” itself. They email you once your note is shredded or deleted so you can rest easy knowing that sensitive information is no longer just laying around in someone’s inbox. Your notes are secured using a strong AES 256bit encryption algorithm with a variable encryption key based on your own password. This means that only the people with the password can decrypt the note. They are not able to decrypt your note or your attachments in anyway. NoteShred doesn’t require any registration or user accounts. It’s all free with no commitment. You can send notes to anybody, all they need is the password. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1702 views

Notedip – Private Secure Self Destructing Messages

July 13, 2013

Notedip – Private Secure Self Destructing Messages
http://notedip.com/

NoteDIP is a free web application that allows you to send secret messages over the internet. These messages will destroy itself after being read. Thus it adds one more layer of protection on our messages. It’s fast, easy, and requires no password or user registration at all. Just write your note, and NoteDIP will generate a link. Then you copy and paste that link into an email (or instant message) that you send to the person who you want to read the note. When that person clicks the link for the first time, they will see the note in their browser and the note will automatically self-destruct; which means no one (even that very same person) can read the note again. The link won’t work anymore. You can optionally choose to be notified when your note is read by leaving your email and a reference for the note. You can also add passwords to ensure more security to your secret messages. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1316 views

SpiderOak – 100% Private Online Backup, Sync and Sharing

July 11, 2013

SpiderOak – 100% Private Online Backup, Sync and Sharing
https://spideroak.com/

First released in 2007, SpiderOak helped define the industry of online backup. Determined to dispel the myth that ‘data online can’t be secure,’ SpiderOak carved its niche as the top choice for those most concerned with privacy. The engineering goal was simple – devise a plan where users’ files, filenames, file types, folders, and/or any other personal information is never exposed to anyone for any reason (even under government subpoena). This describes  SpiderOak’s ‘zero-knowledge’ privacy environment. What does ‘Zero-Knowledge’ privacy mean? In technical terms it means that the server has ‘zero-knowledge’ of your data. In non-technical terms it means that your data is 100% private and  only readable to you. In a world where more and more of our lives are online, it behooves us to think about who has access to our data from critical business documents to personal photo albums. SpiderOak provides  the ability to utilize cloud technologies while retaining that precious  right we call privacy. This will be added to Privacy Resources Subject Tracer™.

965 views

TransCertain – Beyond Platforms

July 09, 2013

TransCertain – Beyond Platforms
http://www.transcertain.com/

TransCertain’s™ Security-Storage-Accessibility-as-a-Service solutions use advanced, proprietary Microtokenization™ / MicroEncryption™ methodology to protect and safeguard personal, corporate, private and any other sensitive information and data while permitting organizations to analyze, share, and distribute mission critical information across multiple platforms in a Ultra-Secure manner.

1146 views