Join Daniel Messer as he goes cypherpunk and talks about keeping yourself secure and private online and in the digital world.
Notes and Links
Private Internet Access ProXPNTorGuard Use incognito or privacy modeUse Firefox over ChromeTOR Browser AdBlock Plus Privacy Badger ChatSecure – Secure chat with Google and XMPP (Android and iOS)TextSecure – Secure SMS and MMS (Android only)RedPhone – Secure calling (Android only)Cryptocat – Secure group chat (iOS only)Wickr – Secure chat with optional time bomb to delete after given time (Android and iOS)Connec+ +or – Secure browsing for AndroidRed Onion – TOR for iOSAs an aside, Facetime and iMessage on iOS are end-to-end encrypted.
Hush Mail Bitmessage GPG TAILS – The Amnesiac Incognito Live SystemUsed by Glenn Greenwald and Edward Snowden.Runs on a flash drive (I wear mine around my neck)Completely anonymous, as it goes around the computer’s hard drive.Uses TOREncrypts your userspaceOr use a live distro of Linux without any persistent storage. You can set up a live USB of Ubuntu or many other distros of Linux. For instance, I also carry Kubuntu around my neck as a live stick.
Unetbootin – works everywhere and it’s easy to use:Create a live USB stick with UbuntuThis is one of the most important things of all. If you’re using weak passwords, then you’re not securing anything at all. It’s the equivalent of leaving a key under your doormat.
Lastpass – The browser plug in is the best, and it works everywhere since it’s just a browser plug in.1Password KeePass – Stand alone, works everywhereStrong Password GeneratorFour Methods to Create a Secure Password You’ll Actually Remember (LifeHacker)Things You Should Be Aware Of
If you’re using software to enhance or protect your privacy, chances are you’re going to be put on a watch list.
NSA’s XKEYSCORE dissected: All Tor users marked as ‘extremists’