2014-05-28: TrueCrypt currently has security issues and is not recommended.
If you’re running GNU/Linux, dm-crypt with LUKS is the recommended encryption option.
Gentoo GNU/Linux maintains a guide for dm-crypt with LUKS.
Arch GNU/Linux maintains a guide to dm-crypt with LUKS. Also useable for Parabola GNU/Linux.
Google Public DNS permanently logs your ISP and location information for analysis. Your ip-address is also stored for 24 hours.
OpenNIC has not adopted an official policy concerning log query privacy/anonymization. More information here.
Riseup is hosted in the USA, in case that matters.
Why not Hushmail? See “compromises to email privacy”.
Bitmessage is a promising alternative to email, but it has not yet been audited by security professionals. Use at your own risk. If you decide to try out Bitmessage, make sure to generate a completely random ID to greatly reduce the probability of ID collisions.
RetroShare has not been thoroughly audited by security professionals for possible security issues.
Switching from a proprietary service like Gmail to one of the more transparently-run email services on PRISM Break is the first step to a secure email account.
The second step is getting you and your contacts to encrypt your plain text messages with PGP encryption. This section contains free email clients that support PGP.
Read the Email Self-Defense guide by the Free Software Foundation to learn how to encrypt your email messages.
Here is a guide by Security In A Box to encrypting your email with Mozilla Thunderbird, GNU Privacy Guard (GPG), and Enigmail.
Find out more about the differences between Mozilla Thunderbird and Icedove.
Why not MEGA? While MEGA is free as in beer, the software is proprietary code.
Why not SpiderOak? SpiderOak is proprietary software.
Why not Tarsnap? Tarsnap is partially proprietary and hosts your data on Amazon Web Services.
The Bitcoin blockchain is a decentralized, public ledger of all transactions in the Bitcoin network.
“It may be the TCP/ip-of money.” —Paul Buchheit
“Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie–Hellman key exchange, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides perfect forward secrecy and malleable encryption.
The primary motivation behind the protocol was providing deniability for the conversation participants while keeping conversations confidential, like a private conversation in real life, or off the record in journalism sourcing.”
Note that Pidgin stores your IM account passwords in plain text. You can avoid this by (1) not saving your password in Pidgin, (2) encrypting your file system, or (3) storing your Pidgin password securely with the Debian package pidgin-gnome-keyring.
Pidgin with OTR and dbus enabled has a local security bug. See the upstream bug report for more information and possible workarounds.
A beginner’s guide to running your own mail server is available here: “NSA-proof your e-mail in 2 hours”.
Kolab integrates Roundcube into its webclient and offers desktop clients as well. Recent versions also feature a file cloud turning it into a complete solution for personal information management.
What is an MTA?
“Within Internet message handling services (MHS), a message transfer agent or mail transfer agent (MTA) or mail relay is software that transfers electronic mail messages from one computer to another using a client–server application architecture. An MTA implements both the client (sending) and server (receiving) portions of the Simple Mail Transfer Protocol.
The terms mail server, mail exchanger, and MX host may also refer to a computer performing the MTA function. The Domain Name System (DNS) associates a mail server to a domain with mail exchanger (MX) resource records containing the domain name of a host providing MTA services.”
A mesh-networks is a decentralized peer-to-peer network, with user-controlled physical links that are usually wireless.
“Mesh networking (topology) is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to propagate the data in the network.“
Apple, Google e Microsoft são parte do PRISM. Seus sistemas operacionais proprietários não são confiáveis para proteger seus dados pessoais da NSA.Isto só deixa duas alternativas livres: GNU/Linux e BSD.
GNU/Linux possui uma vasta comunidade que pode ajudar na transição. Recomendamos que você comece sua busca por uma distribuição GNU/Linux que atenda suas necessidades.
Por quê não Ubuntu? Ubuntu é uma má escolha, pois ele contém spywares.
Utilizar a distribuição 'live' Tails é a forma mais fácil e rápida de proteger um sistema operacional. Tudo que deve se fazer é criar um CD ou USB 'bootável' com os arquivos indicados e pronto. Todo o resto será configurado para você.
Uma imagem de máquina virtual como o Whonix deve ser execuada dentro de uma solução de virtualização como o VirtualBox. VirtualBox pode ser instalado no Windows, Linux, macOS e Solaris. Isto significa que se você não puder substituir seu Windows ou macOS por qualquer motivo, você pode instalar o VirtualBox e utilizar o Whonix para ampliar sua privacidade e segurança.
The etherpad project maintains a list of sites that run etherpad services. Please only choose from the services that use SSL, and research the site's background before trusting them with your data.
Jitsi is a drop-in, encrypted replacement for almost all the tasks Skype is used for.
Mumble an open source voice chat client in the style of Ventrilo and TeamSpeak.
WebRTC is an upcoming, promising browser to browser communications API.
Installing your own add-ons into the Tor Browser is not recommended, as they may bypass Tor or otherwise harm your anonymity and privacy. Check the EFF's Panopticlick to see how trackable your browser configuration is by third parties.
If you're using a Firefox-based browser, you can safeguard your browsing habits and stop advertising companies from tracking you by installing uBlock Origin, Request Policy, and HTTPS Everywhere.
A more advanced alternative to Request Policy would be uMatrix.
Why is Adblock Plus not recommended? Adblock Plus shows “acceptable ads” by default, which works against the purpose of the add-on. Either disable acceptable ads or use uBlock Origin instead.
Use a combination of Tor Browser and a free web browser of your choice to the surf the web.
Try to use Tor Browser as often as possible. Browsing is slower with Tor, but far more secure.
Note: Mozilla Firefox is technically not completely free software, as Mozilla recommends non-free add-ons on their website.
There is also a DuckDuckGo hidden service at 3g2upl4pq6kufc4m.onion for Tor users.
MetaGer is a SaaS by the German non-profit SUMA e.V. that provides you with anonymous meta search results.
Startpage is a SaaS hosted in the USA and the Netherlands that provides you with anonymous Google search and image results through a free proxy.
Ixquick (run by the same company as Startpage) is a meta search engine that returns combined results from nearly 100 sources - excluding Google.
Seeks acts as a personalizing Web server or proxy between you and your data feeds. Connect most search engines, RSS/ATOM feeds, Twitter/Identica, Youtube/Dailymotion, wikis, and basically any source of data, and Seeks will produce a fused personalized stream of results to your queries. See list of Web Seeks nodes.
Tor users may use Seeks hidden service at 5plvrsgydwy2sgce.onion.
YaCy is a promising project that offers fully decentralized peer-to-peer search. The more people who start using it, the better the results will become.