Forwarded from Deleted Account
Forwarded from Private Your Tech News (IFTTT)
If you like the free and open internet, why not donate to important projects like @EFF @torproject @QubesOS https://t.co/sPeU1ADQSX https://t.co/laoMbJie0B https://t.co/xSZKbOp43h #Security #Privacy #infosec #opensource
— Edward Kiledjian (@ekiledjian) July 5, 2019
— Edward Kiledjian (@ekiledjian) July 5, 2019
Forwarded from Private Your Tech News (IFTTT)
Go Incognito isn’t halfway done, first lessons aren’t even a year old, yet they’ve been currently viewed by over 220,000 people with an average of over a 98% like/dislike ratio. Watch the course free on https://t.co/SKAYyylANu #security #privacy #anonymity #anonymous #tor #eff pic.twitter.com/Oe4tm3M6bY
— Techlore (@techloreistaken) September 2, 2019
— Techlore (@techloreistaken) September 2, 2019
techlore.tech
Techlore | Spreading Privacy To The Masses
Techlore is spreading spreading privacy and security to the masses. Home of Go Incognito, Surveillance Report, VPN reviews, video tutorials, software/hardware reviews, communities, and more; join us today!
Forwarded from Private Your Tech News (IFTTT)
Eyes in the Sky community reading part 1 comes out later tonight. Very, very, very spooky. Tune in to catch the summary! #Privacy #security #dystopian #AirForce pic.twitter.com/dliYlB7Weo
— Techlore (@techloreistaken) September 9, 2019
— Techlore (@techloreistaken) September 9, 2019
Twitter
News about #privacy on Twitter
2h ago @ZeeNewsEnglish tweeted: "#WhatsApp sues the Indian government, sa.." - read what others are saying and join the conversation.
Forwarded from BlackBox (Security) Archiv
University of Minnesota security researchers apologize for deliberately buggy Linux patches
The abashed University of Minnesota researchers apologized for their blunders, but the issues are far from resolved. And, Linus Torvalds briefly addresses the fouled up Linux patches.
Last week, some University of Minnesota (UMN) security researchers kicked a hornet nest, when it was revealed that they'd tried to insert deliberately buggy patches into Linux. Greg Kroah-Hartman, the well-respected Linux kernel maintainer for the Linux stable branch, responded by banning not only them but any UMN-connected developers from contributing to the Linux kernel. Now, the researchers have sort of, kind of, apologized for their mistakes: "We sincerely apologize for any harm our research group did to the Linux kernel community."
https://www.zdnet.com/article/university-of-minnesota-security-researchers-apologize-for-deliberately-buggy-linux-patches/
https://lore.kernel.org/lkml/CAK8KejpUVLxmqp026JY7x5GzHU2YJLPU8SzTZUNXU2OXC70ZQQ@mail.gmail.com/T/#u
#opensource #security #minnesota #university #trolling #apologize
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The abashed University of Minnesota researchers apologized for their blunders, but the issues are far from resolved. And, Linus Torvalds briefly addresses the fouled up Linux patches.
Last week, some University of Minnesota (UMN) security researchers kicked a hornet nest, when it was revealed that they'd tried to insert deliberately buggy patches into Linux. Greg Kroah-Hartman, the well-respected Linux kernel maintainer for the Linux stable branch, responded by banning not only them but any UMN-connected developers from contributing to the Linux kernel. Now, the researchers have sort of, kind of, apologized for their mistakes: "We sincerely apologize for any harm our research group did to the Linux kernel community."
https://www.zdnet.com/article/university-of-minnesota-security-researchers-apologize-for-deliberately-buggy-linux-patches/
https://lore.kernel.org/lkml/CAK8KejpUVLxmqp026JY7x5GzHU2YJLPU8SzTZUNXU2OXC70ZQQ@mail.gmail.com/T/#u
#opensource #security #minnesota #university #trolling #apologize
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
ZDNet
University of Minnesota security researchers apologize for deliberately buggy Linux patches
The abashed University of Minnesota researchers apologized for their blunders, but the issues are far from resolved. And, Linus Torvalds briefly addresses the fouled up Linux patches.
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against the Police State
https://t.me/RevToolboxRedux/2559
What To Do When You're Arrested
https://t.me/RevToolboxRedux/2585
Surveillance Self Defense in Public Spaces
https://t.me/RevToolboxRedux/2755
Movement Defense Means All of Us - A guide to building resilient movements and countering repression.
https://t.me/RevToolboxRedux/2070
No Badjacketing - The State Wants To Kill Us, Let's Not Cooperate (important article)
https://t.me/RevToolboxRedux/2915
Why Misogynists Make Great Informants
https://t.me/RevToolboxRedux/2916
Digital Communication Protocols Beyond Telegram
https://t.me/RevToolboxRedux/3338
Police Infiltrators - the ultimate betrayal
https://t.me/RevToolboxRedux/2502
Privacy/Security Resource list
https://t.me/RevToolboxRedux/12
Some tips on staying secure online
https://t.me/RevToolboxRedux/157
Elicitation - subtly soliciting information
https://t.me/RevToolboxRedux/167
Telegram tips for group/channel admins (old)
https://t.me/RevToolboxRedux/198
Breaking News Consumer's Handbook
https://t.me/RevToolboxRedux/209
Antifascism is Self Defense
https://t.me/RevToolboxRedux/264
Digital security resources for activists
https://t.me/RevToolboxRedux/267
Know Your Rights - A Crashcourse 4 Protesters (Don't Shoot PDX)
https://t.me/RevToolboxRedux/273
Best Practices for Signal Threads
https://t.me/RevToolboxRedux/280
The Riot is One Night But Metadata is Forever
https://t.me/RevToolboxRedux/293
Never Talk to the Cops
https://t.me/RevToolboxRedux/294
Before Posting Ask Yourself - does this pose a risk?
https://t.me/RevToolboxRedux/295
Surveillance Self Defense (EFF)
https://t.me/RevToolboxRedux/309
How To Make It Harder for Cops to Do Their Jobs
https://t.me/RevToolboxRedux/310
Beating FBI Surveillance
https://t.me/RevToolboxRedux/319
How To Find Hidden Cameras
https://t.me/RevToolboxRedux/334
DIY Faraday Bag (untested)
https://t.me/RevToolboxRedux/327
Guide to IMSI Catchers (Fake Cell Towers)
https://t.me/RevToolboxRedux/337
Covering Cameras w/ Umbrellas
https://t.me/RevToolboxRedux/369
Getting Started - Telegram Anonymity
https://t.me/RevToolboxRedux/370
Tails OS Leaflet
https://t.me/RevToolboxRedux/378
Car Brigade Techniques
https://t.me/RevToolboxRedux/407
Beware Swoopers
https://t.me/RevToolboxRedux/431
Spread Good Info! S.A.L.U.T.E.
https://t.me/RevToolboxRedux/436
Anarchist Direct Actions - A Challenge for Law Enforcement
https://t.me/RevToolboxRedux/462
What To Do If You Are Stopped by the Police
https://t.me/RevToolboxRedux/465
Criptica. Resistencia Digital (espanol)
https://t.me/RevToolboxRedux/467
Which Apps Are Secure and End-to-End Encrypted?
https://t.me/RevToolboxRedux/495
When the Police Knock on Your Door
https://t.me/RevToolboxRedux/517
Dress for Success - Disguise without Bloc
https://t.me/RevToolboxRedux/518
Look Out for Fascist Entryism
https://t.me/RevToolboxRedux/520
What to Do If You Receive an Unsolicited Message
https://t.me/RevToolboxRedux/528
PDX Decentralized Comms Ruleset
https://t.me/RevToolboxRedux/536
Only Networks Can Defeat Networks - decentralized digital struggle
https://t.me/RevToolboxRedux/607
The Basics of Firearm Safety
https://t.me/RevToolboxRedux/643
Assertive Intervention and Deescalation Tools and Tips
https://t.me/RevToolboxRedux/646
Faraday Bag from CLDC
https://t.me/RevToolboxRedux/652
How to Lock Your SIM Card
https://t.me/RevToolboxRedux/683
How to Spot NYPD Unmarked Cars
https://t.me/RevToolboxRedux/685
Digital Safety at Protests
https://t.me/RevToolboxRedux/687
Crossing the U.S. Border - crimethinc
https://t.me/RevToolboxRedux/742
Gentleman's Guide to Forum Spies and Spooks
https://t.me/RevToolboxRedux/750
Atlas of Surveillance - Documenting Police Tech
https://t.me/RevToolboxRedux/784
2 Twitter Alternatives
https://t.me/RevToolboxRedux/786
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against the Police State
https://t.me/RevToolboxRedux/2559
What To Do When You're Arrested
https://t.me/RevToolboxRedux/2585
Surveillance Self Defense in Public Spaces
https://t.me/RevToolboxRedux/2755
Movement Defense Means All of Us - A guide to building resilient movements and countering repression.
https://t.me/RevToolboxRedux/2070
No Badjacketing - The State Wants To Kill Us, Let's Not Cooperate (important article)
https://t.me/RevToolboxRedux/2915
Why Misogynists Make Great Informants
https://t.me/RevToolboxRedux/2916
Digital Communication Protocols Beyond Telegram
https://t.me/RevToolboxRedux/3338
Police Infiltrators - the ultimate betrayal
https://t.me/RevToolboxRedux/2502
Privacy/Security Resource list
https://t.me/RevToolboxRedux/12
Some tips on staying secure online
https://t.me/RevToolboxRedux/157
Elicitation - subtly soliciting information
https://t.me/RevToolboxRedux/167
Telegram tips for group/channel admins (old)
https://t.me/RevToolboxRedux/198
Breaking News Consumer's Handbook
https://t.me/RevToolboxRedux/209
Antifascism is Self Defense
https://t.me/RevToolboxRedux/264
Digital security resources for activists
https://t.me/RevToolboxRedux/267
Know Your Rights - A Crashcourse 4 Protesters (Don't Shoot PDX)
https://t.me/RevToolboxRedux/273
Best Practices for Signal Threads
https://t.me/RevToolboxRedux/280
The Riot is One Night But Metadata is Forever
https://t.me/RevToolboxRedux/293
Never Talk to the Cops
https://t.me/RevToolboxRedux/294
Before Posting Ask Yourself - does this pose a risk?
https://t.me/RevToolboxRedux/295
Surveillance Self Defense (EFF)
https://t.me/RevToolboxRedux/309
How To Make It Harder for Cops to Do Their Jobs
https://t.me/RevToolboxRedux/310
Beating FBI Surveillance
https://t.me/RevToolboxRedux/319
How To Find Hidden Cameras
https://t.me/RevToolboxRedux/334
DIY Faraday Bag (untested)
https://t.me/RevToolboxRedux/327
Guide to IMSI Catchers (Fake Cell Towers)
https://t.me/RevToolboxRedux/337
Covering Cameras w/ Umbrellas
https://t.me/RevToolboxRedux/369
Getting Started - Telegram Anonymity
https://t.me/RevToolboxRedux/370
Tails OS Leaflet
https://t.me/RevToolboxRedux/378
Car Brigade Techniques
https://t.me/RevToolboxRedux/407
Beware Swoopers
https://t.me/RevToolboxRedux/431
Spread Good Info! S.A.L.U.T.E.
https://t.me/RevToolboxRedux/436
Anarchist Direct Actions - A Challenge for Law Enforcement
https://t.me/RevToolboxRedux/462
What To Do If You Are Stopped by the Police
https://t.me/RevToolboxRedux/465
Criptica. Resistencia Digital (espanol)
https://t.me/RevToolboxRedux/467
Which Apps Are Secure and End-to-End Encrypted?
https://t.me/RevToolboxRedux/495
When the Police Knock on Your Door
https://t.me/RevToolboxRedux/517
Dress for Success - Disguise without Bloc
https://t.me/RevToolboxRedux/518
Look Out for Fascist Entryism
https://t.me/RevToolboxRedux/520
What to Do If You Receive an Unsolicited Message
https://t.me/RevToolboxRedux/528
PDX Decentralized Comms Ruleset
https://t.me/RevToolboxRedux/536
Only Networks Can Defeat Networks - decentralized digital struggle
https://t.me/RevToolboxRedux/607
The Basics of Firearm Safety
https://t.me/RevToolboxRedux/643
Assertive Intervention and Deescalation Tools and Tips
https://t.me/RevToolboxRedux/646
Faraday Bag from CLDC
https://t.me/RevToolboxRedux/652
How to Lock Your SIM Card
https://t.me/RevToolboxRedux/683
How to Spot NYPD Unmarked Cars
https://t.me/RevToolboxRedux/685
Digital Safety at Protests
https://t.me/RevToolboxRedux/687
Crossing the U.S. Border - crimethinc
https://t.me/RevToolboxRedux/742
Gentleman's Guide to Forum Spies and Spooks
https://t.me/RevToolboxRedux/750
Atlas of Surveillance - Documenting Police Tech
https://t.me/RevToolboxRedux/784
2 Twitter Alternatives
https://t.me/RevToolboxRedux/786
Telegram
Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
If You Don't Need to Say It, Don't Say It (discussion
https://t.me/RevToolboxRedux/797
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/814…
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
If You Don't Need to Say It, Don't Say It (discussion
https://t.me/RevToolboxRedux/797
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/814…
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
If You Don't Need to Say It, Don't Say It (discussion
https://t.me/RevToolboxRedux/797
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/814
https://t.me/RevToolboxRedux/931 - PDF
Survival Guide for Popular Resistance
https://t.me/RevToolboxRedux/824
Know Your Rights - ACLU MN
https://t.me/RevToolboxRedux/862
Towards A Citizen's Militia: Anarchists Alternatives to NATO and the Warsaw Pact (1980)
https://t.me/RevToolboxRedux/890
Three Criticisms of Livestreaming [at protests]
https://t.me/RevToolboxRedux/934
Remote Uprising Support Team (RUST) Zine
https://t.me/RevToolboxRedux/937
Consent Culture - basic security culture tips
https://t.me/RevToolboxRedux/960
Protest Safety Guide - Across Frontlines
https://t.me/RevToolboxRedux/1012
NYC ICE Watch - ICE Patrols
https://t.me/RevToolboxRedux/1039
Know Your Rights when ICE or Feds are at the door
https://t.me/RevToolboxRedux/1055
SAFETY & SECURITY GUIDELINES
https://t.me/RevToolboxRedux/1058
Build a Wall of Resistance - Don't Talk to the FBI (picture)
https://t.me/RevToolboxRedux/1094
List of Informative Guides for Street Conflicts
https://t.me/RevToolboxRedux/1114
A thread how to protect your privacy via phone safety at demonstrations--before, during, and after the protest
https://t.me/RevToolboxRedux/1115
S.A.L.U.T.E. Guide
https://t.me/RevToolboxRedux/1117
How to Easily Harden Signal
https://t.me/RevToolboxRedux/1118
the Data Detox Kit - Fistful of Privacy Tips
https://t.me/RevToolboxRedux/15
IT COULD HAPPEN HERE - preparing for political crises and far right violence
https://t.me/RevToolboxRedux/1172
Protest Safety Basics - Black Bloc
https://t.me/RevToolboxRedux/1175
EarthFirst! Opsec Story
https://t.me/RevToolboxRedux/1204
Taking Ourselves Seriously - Digital Harm Reduction discussion by RadioFragmata
https://t.me/RevToolboxRedux/1288
Don't Speak without a Lawyer Present
https://t.me/RevToolboxRedux/1292
If You Get Arrested: DON'T SPEAK (infographic)
https://t.me/RevToolboxRedux/1297
Party Protips
https://t.me/RevToolboxRedux/1298
What to Do If You're Marked by Police with color UV mace/dye
https://t.me/RevToolboxRedux/1338
Comrades Don't Livestream Comrades
https://t.me/RevToolboxRedux/1339
How To Set Up an Anonymous Burner Phone
https://t.me/RevToolboxRedux/1340
How to Build a Paper Trail - for tenant struggles
https://t.me/RevToolboxRedux/1357
Cops are Petty - They WIll Remember You
https://t.me/RevToolboxRedux/1376
Spotting a hidden handgun
https://t.me/RevToolboxRedux/1385
The Fascist Infiltration of Subculture
https://t.me/RevToolboxRedux/1387
Security Culture - A Handbook for Activists
https://t.me/RevToolboxRedux/1401
Trainstopping - Intervening with Rail Transport through blockade and sabotage
https://t.me/RevToolboxRedux/1436
How to Find Hidden Cameras
https://t.me/RevToolboxRedux/1465
Security Alert - Hardening your Telegram
https://t.me/RevToolboxRedux/1503
PSA to all comrades with radios
https://t.me/RevToolboxRedux/1546
An Activists Guide to Informational Security (2016)
https://t.me/RevToolboxRedux/1570
Curated List of Digital Tools for Activism
https://t.me/RevToolboxRedux/1577
Security Reminder w/ Links
https://t.me/RevToolboxRedux/1578
If An Agent Knocks - What To Do
https://t.me/RevToolboxRedux/1625
Was My Friend a Spy-Cop? A Guide to Investigating Suspicions and Providing Emotional Support
https://t.me/RevToolboxRedux/1631
List of Printers with Tracking Dots
https://t.me/RevToolboxRedux/1693
Metadata Kills - Anti-Google
https://t.me/RevToolboxRedux/1700
Privacy Alternatives to Social Networks
https://t.me/RevToolboxRedux/1711
HackBack! A DIY guide to rob banks
https://t.me/RevToolboxRedux/1770
Talking To Cops is Never Safe (good infographic)
https://t.me/RevToolboxRedux/1789
Web Security and Web Hacking for Beginners (video series)
https://t.me/RevToolboxRedux/1797
Grand Juries & Grand Jury Resistance
https://t.me/RevToolboxRedux/1810
#directory
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
If You Don't Need to Say It, Don't Say It (discussion
https://t.me/RevToolboxRedux/797
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/814
https://t.me/RevToolboxRedux/931 - PDF
Survival Guide for Popular Resistance
https://t.me/RevToolboxRedux/824
Know Your Rights - ACLU MN
https://t.me/RevToolboxRedux/862
Towards A Citizen's Militia: Anarchists Alternatives to NATO and the Warsaw Pact (1980)
https://t.me/RevToolboxRedux/890
Three Criticisms of Livestreaming [at protests]
https://t.me/RevToolboxRedux/934
Remote Uprising Support Team (RUST) Zine
https://t.me/RevToolboxRedux/937
Consent Culture - basic security culture tips
https://t.me/RevToolboxRedux/960
Protest Safety Guide - Across Frontlines
https://t.me/RevToolboxRedux/1012
NYC ICE Watch - ICE Patrols
https://t.me/RevToolboxRedux/1039
Know Your Rights when ICE or Feds are at the door
https://t.me/RevToolboxRedux/1055
SAFETY & SECURITY GUIDELINES
https://t.me/RevToolboxRedux/1058
Build a Wall of Resistance - Don't Talk to the FBI (picture)
https://t.me/RevToolboxRedux/1094
List of Informative Guides for Street Conflicts
https://t.me/RevToolboxRedux/1114
A thread how to protect your privacy via phone safety at demonstrations--before, during, and after the protest
https://t.me/RevToolboxRedux/1115
S.A.L.U.T.E. Guide
https://t.me/RevToolboxRedux/1117
How to Easily Harden Signal
https://t.me/RevToolboxRedux/1118
the Data Detox Kit - Fistful of Privacy Tips
https://t.me/RevToolboxRedux/15
IT COULD HAPPEN HERE - preparing for political crises and far right violence
https://t.me/RevToolboxRedux/1172
Protest Safety Basics - Black Bloc
https://t.me/RevToolboxRedux/1175
EarthFirst! Opsec Story
https://t.me/RevToolboxRedux/1204
Taking Ourselves Seriously - Digital Harm Reduction discussion by RadioFragmata
https://t.me/RevToolboxRedux/1288
Don't Speak without a Lawyer Present
https://t.me/RevToolboxRedux/1292
If You Get Arrested: DON'T SPEAK (infographic)
https://t.me/RevToolboxRedux/1297
Party Protips
https://t.me/RevToolboxRedux/1298
What to Do If You're Marked by Police with color UV mace/dye
https://t.me/RevToolboxRedux/1338
Comrades Don't Livestream Comrades
https://t.me/RevToolboxRedux/1339
How To Set Up an Anonymous Burner Phone
https://t.me/RevToolboxRedux/1340
How to Build a Paper Trail - for tenant struggles
https://t.me/RevToolboxRedux/1357
Cops are Petty - They WIll Remember You
https://t.me/RevToolboxRedux/1376
Spotting a hidden handgun
https://t.me/RevToolboxRedux/1385
The Fascist Infiltration of Subculture
https://t.me/RevToolboxRedux/1387
Security Culture - A Handbook for Activists
https://t.me/RevToolboxRedux/1401
Trainstopping - Intervening with Rail Transport through blockade and sabotage
https://t.me/RevToolboxRedux/1436
How to Find Hidden Cameras
https://t.me/RevToolboxRedux/1465
Security Alert - Hardening your Telegram
https://t.me/RevToolboxRedux/1503
PSA to all comrades with radios
https://t.me/RevToolboxRedux/1546
An Activists Guide to Informational Security (2016)
https://t.me/RevToolboxRedux/1570
Curated List of Digital Tools for Activism
https://t.me/RevToolboxRedux/1577
Security Reminder w/ Links
https://t.me/RevToolboxRedux/1578
If An Agent Knocks - What To Do
https://t.me/RevToolboxRedux/1625
Was My Friend a Spy-Cop? A Guide to Investigating Suspicions and Providing Emotional Support
https://t.me/RevToolboxRedux/1631
List of Printers with Tracking Dots
https://t.me/RevToolboxRedux/1693
Metadata Kills - Anti-Google
https://t.me/RevToolboxRedux/1700
Privacy Alternatives to Social Networks
https://t.me/RevToolboxRedux/1711
HackBack! A DIY guide to rob banks
https://t.me/RevToolboxRedux/1770
Talking To Cops is Never Safe (good infographic)
https://t.me/RevToolboxRedux/1789
Web Security and Web Hacking for Beginners (video series)
https://t.me/RevToolboxRedux/1797
Grand Juries & Grand Jury Resistance
https://t.me/RevToolboxRedux/1810
#directory
Telegram
Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against…
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against…
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Some Guides to Interacting With the FBI
https://t.me/RevToolboxRedux/1828
Fuck Off Google! - Invisible Committee
https://t.me/RevToolboxRedux/1843
Police At the Door - What to do
https://t.me/RevToolboxRedux/1865
Digital Safety Story
https://t.me/RevToolboxRedux/1867
STOP TALKING Before It's Too Late!
https://t.me/RevToolboxRedux/1868
Doxcare - by Crimethinc
https://t.me/RevToolboxRedux/1879
EXIF Cleaners for Clean Image Files
https://t.me/RevToolboxRedux/1935
How To Protect Your Privacy at a Protest (video)
https://t.me/RevToolboxRedux/1939
Attending a Protest - Surveillance Self Defense
https://t.me/RevToolboxRedux/1945
Ten Rules of the Protester - translated from Russian
https://t.me/RevToolboxRedux/1951
Overview/Comparison of different messaging apps
https://t.me/RevToolboxRedux/1985
Wessel's Opsec Guide
https://t.me/RevToolboxRedux/1997
Become Anonymous - a video guide
https://t.me/RevToolboxRedux/2017
Ten Ways to Secure Your Telegram
https://t.me/RevToolboxRedux/2029
Warrior Crowd Control and Riot Manual
https://t.me/RevToolboxRedux/2037
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/2057
S.A.L.U.T.E. Spread Info Not Panic (original)
https://t.me/RevToolboxRedux/2114
How Long It Will Take to Crack Your Password
https://t.me/RevToolboxRedux/2118
Black Bloc Tactics - Crimethinc
https://t.me/RevToolboxRedux/2119
Ozimandias Direct Action and Sabotage Handbook
https://t.me/RevToolboxRedux/2122
Guide to Communications and OSINT for 2020 protest movements
https://t.me/RevToolboxRedux/2123
WTO Seattle Logistics Zine (1999)
https://t.me/RevToolboxRedux/2127
PDX Hivebloc Guides
https://t.me/RevToolboxRedux/2128
Confidence Courage Connection Trust - A Proposal for Security Culture
https://t.me/RevToolboxRedux/2131
The Riot Is One Night, But Metadata Lasts Forever
https://t.me/RevToolboxRedux/2132
Digital Safety Kit (committee to protect journalists)
https://t.me/RevToolboxRedux/2133
Stingray Trackers - what you need to know and how to protect yourself
https://t.me/RevToolboxRedux/2134
T-Shirt/Ninja Bloc
https://t.me/RevToolboxRedux/2135
Anti-Surveillance Toolkit - Photography and Video
https://t.me/RevToolboxRedux/2142
The Riot Is One Night, But Metadata Lasts Forever (alt)
https://t.me/RevToolboxRedux/2143
How to Protect Yourself and Others from Police Agitation
https://t.me/RevToolboxRedux/2196
How to Identify Police Surveillance (video, EFF)
https://t.me/RevToolboxRedux/2203
DIY Occupation Guide and Squatters Resources
https://t.me/RevToolboxRedux/2218
Didn't See Nothin' Don't Know Nothin', A Social Media Field Guide
https://t.me/RevToolboxRedux/2238
Resources, Tips, Communiques for Direct Action and CCTV Sabotage
https://t.me/RevToolboxRedux/2241
Resist State Oppression (art)
https://t.me/RevToolboxRedux/2255
The Red Flags of Rogue URL's
https://t.me/RevToolboxRedux/2256
Anonymize Your Online Footprint
https://t.me/RevToolboxRedux/2257
Earthfirst! Direct Action Manual for Monkeywrenchers
https://t.me/RevToolboxRedux/2306
Flyer for Livestreamers and Journalists
https://t.me/RevToolboxRedux/2310
What to Do In the Upcoming Days - for protesters in Burma
https://t.me/RevToolboxRedux/2321
If ICE Agents Show Up At Your Door
https://t.me/RevToolboxRedux/2328
A Recipe for Nocturnal Direct Actions! (zine)
https://t.me/RevToolboxRedux/2330
US Army FM 3-24 - Insurgencies and Countering Insurgencies
https://t.me/RevToolboxRedux/2350
Ecodefense: A Field Guide to Monkeywrenching
https://t.me/RevToolboxRedux/2355
Front-ends for evil sites/platforms
https://t.me/RevToolboxRedux/2408
How To Watch YouTube Without App/Website
https://t.me/RevToolboxRedux/2411
Use Your Right to Report Responsibly
https://t.me/RevToolboxRedux/2446
Protest Reporting Toolkit
https://t.me/RevToolboxRedux/2451
The Cops Don't Play Fair, Be Prepared
https://t.me/RevToolboxRedux/2457
No Face, No Case
https://t.me/RevToolboxRedux/2487
https://t.me/RevToolboxRedux/2519
#directory
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Some Guides to Interacting With the FBI
https://t.me/RevToolboxRedux/1828
Fuck Off Google! - Invisible Committee
https://t.me/RevToolboxRedux/1843
Police At the Door - What to do
https://t.me/RevToolboxRedux/1865
Digital Safety Story
https://t.me/RevToolboxRedux/1867
STOP TALKING Before It's Too Late!
https://t.me/RevToolboxRedux/1868
Doxcare - by Crimethinc
https://t.me/RevToolboxRedux/1879
EXIF Cleaners for Clean Image Files
https://t.me/RevToolboxRedux/1935
How To Protect Your Privacy at a Protest (video)
https://t.me/RevToolboxRedux/1939
Attending a Protest - Surveillance Self Defense
https://t.me/RevToolboxRedux/1945
Ten Rules of the Protester - translated from Russian
https://t.me/RevToolboxRedux/1951
Overview/Comparison of different messaging apps
https://t.me/RevToolboxRedux/1985
Wessel's Opsec Guide
https://t.me/RevToolboxRedux/1997
Become Anonymous - a video guide
https://t.me/RevToolboxRedux/2017
Ten Ways to Secure Your Telegram
https://t.me/RevToolboxRedux/2029
Warrior Crowd Control and Riot Manual
https://t.me/RevToolboxRedux/2037
A Practical Security Handbook for Activists and Campaigns
https://t.me/RevToolboxRedux/2057
S.A.L.U.T.E. Spread Info Not Panic (original)
https://t.me/RevToolboxRedux/2114
How Long It Will Take to Crack Your Password
https://t.me/RevToolboxRedux/2118
Black Bloc Tactics - Crimethinc
https://t.me/RevToolboxRedux/2119
Ozimandias Direct Action and Sabotage Handbook
https://t.me/RevToolboxRedux/2122
Guide to Communications and OSINT for 2020 protest movements
https://t.me/RevToolboxRedux/2123
WTO Seattle Logistics Zine (1999)
https://t.me/RevToolboxRedux/2127
PDX Hivebloc Guides
https://t.me/RevToolboxRedux/2128
Confidence Courage Connection Trust - A Proposal for Security Culture
https://t.me/RevToolboxRedux/2131
The Riot Is One Night, But Metadata Lasts Forever
https://t.me/RevToolboxRedux/2132
Digital Safety Kit (committee to protect journalists)
https://t.me/RevToolboxRedux/2133
Stingray Trackers - what you need to know and how to protect yourself
https://t.me/RevToolboxRedux/2134
T-Shirt/Ninja Bloc
https://t.me/RevToolboxRedux/2135
Anti-Surveillance Toolkit - Photography and Video
https://t.me/RevToolboxRedux/2142
The Riot Is One Night, But Metadata Lasts Forever (alt)
https://t.me/RevToolboxRedux/2143
How to Protect Yourself and Others from Police Agitation
https://t.me/RevToolboxRedux/2196
How to Identify Police Surveillance (video, EFF)
https://t.me/RevToolboxRedux/2203
DIY Occupation Guide and Squatters Resources
https://t.me/RevToolboxRedux/2218
Didn't See Nothin' Don't Know Nothin', A Social Media Field Guide
https://t.me/RevToolboxRedux/2238
Resources, Tips, Communiques for Direct Action and CCTV Sabotage
https://t.me/RevToolboxRedux/2241
Resist State Oppression (art)
https://t.me/RevToolboxRedux/2255
The Red Flags of Rogue URL's
https://t.me/RevToolboxRedux/2256
Anonymize Your Online Footprint
https://t.me/RevToolboxRedux/2257
Earthfirst! Direct Action Manual for Monkeywrenchers
https://t.me/RevToolboxRedux/2306
Flyer for Livestreamers and Journalists
https://t.me/RevToolboxRedux/2310
What to Do In the Upcoming Days - for protesters in Burma
https://t.me/RevToolboxRedux/2321
If ICE Agents Show Up At Your Door
https://t.me/RevToolboxRedux/2328
A Recipe for Nocturnal Direct Actions! (zine)
https://t.me/RevToolboxRedux/2330
US Army FM 3-24 - Insurgencies and Countering Insurgencies
https://t.me/RevToolboxRedux/2350
Ecodefense: A Field Guide to Monkeywrenching
https://t.me/RevToolboxRedux/2355
Front-ends for evil sites/platforms
https://t.me/RevToolboxRedux/2408
How To Watch YouTube Without App/Website
https://t.me/RevToolboxRedux/2411
Use Your Right to Report Responsibly
https://t.me/RevToolboxRedux/2446
Protest Reporting Toolkit
https://t.me/RevToolboxRedux/2451
The Cops Don't Play Fair, Be Prepared
https://t.me/RevToolboxRedux/2457
No Face, No Case
https://t.me/RevToolboxRedux/2487
https://t.me/RevToolboxRedux/2519
#directory
Telegram
Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against…
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against…
Forwarded from Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Video on How to Handle a Detective Visit
https://t.me/RevToolboxRedux/1823
What Is Autonomous Action?
https://t.me/RevToolboxRedux/2512
Some Protest Basics
https://t.me/RevToolboxRedux/2513
Guides for Police Provocateurs and FBI Agents
https://t.me/RevToolboxRedux/2537
Don't Become the State's Eyes (image)
https://t.me/RevToolboxRedux/2538
Digital Security Guidelines - CLDC Digital Security Program
https://t.me/RevToolboxRedux/2557
Protest Safety Planning
https://t.me/RevToolboxRedux/2596
Pittsburgh: Reflections on Leadership and Collective Autonomy
https://t.me/RevToolboxRedux/2618
Basic Guide to Protesting Safely
https://t.me/RevToolboxRedux/2689
When the Police Knock on Your Door
https://t.me/RevToolboxRedux/2711
Anti- and Counter-Surveillance Techniques for Intelligence Officers
https://t.me/RevToolboxRedux/2768
Telegram 101: How to communicate securely in Telegram?
https://t.me/RevToolboxRedux/2808
Black Bloc, Grey Bloc, and Debloc
https://t.me/RevToolboxRedux/2928
No Face No Case, 1312
https://t.me/RevToolboxRedux/2953
Reinforce Rights Not Racism (image)
https://t.me/RevToolboxRedux/2971
FM 34-2-1 Reconnaissance and Surveillance and Intelligence Support to Counterreconnaissance (1991)
https://t.me/RevToolboxRedux/2974
Hitchhikers Guide to Online Anonymity
https://t.me/RevToolboxRedux/2975
Burner Phone Best Practices
https://t.me/RevToolboxRedux/2976
Counterinsurgency in Modern Warfare (2008)
https://t.me/RevToolboxRedux/2992
Army Support to Military Deception, FM 3-13.4
https://t.me/RevToolboxRedux/2993
All Cameras Are Breakable
https://t.me/RevToolboxRedux/3000
Watch Out For Snitches (poster)
https://t.me/RevToolboxRedux/3017
Holistic Security: A Strategy Manual for Human Rights Defenders
https://t.me/RevToolboxRedux/3054
Never Turn Off The Phone: A new approach to security culture
https://t.me/RevToolboxRedux/3055
Rebel Alliance Tech Manual
https://t.me/RevToolboxRedux/3056
Secrets and Lies (story about informal organization)
https://t.me/RevToolboxRedux/3057
Digital Harm Reduction - Taking Ourselves Seriously article 1
https://t.me/RevToolboxRedux/3058
The Invisible Ground: honoring each others security needs
https://t.me/RevToolboxRedux/3059
Recording or taking photo's at a protest can be unwise (image)
https://t.me/RevToolboxRedux/3076
List of found physical surveillance devices
https://t.me/RevToolboxRedux/3086
Things I Wish I Did Before Being Raided by the Police
https://t.me/RevToolboxRedux/3087
Defend Dissent - Digital Suppression and Cryptographic Defense of Social Movements
https://t.me/RevToolboxRedux/3090
LOCKING DOWN SIGNAl (article)
https://t.me/RevToolboxRedux/3091
How To Prevent Facial Recognition Technology from Identifying You
https://t.me/RevToolboxRedux/3159
Doxxing Prevention Harm Reduction Training
https://t.me/RevToolboxRedux/3161
Damage Control - the story of how one activist group kept ourselves safe and strong in the face of movement infiltration
https://t.me/RevToolboxRedux/3162
Security and Counter-Surveillance: Information Against the Police State
https://t.me/RevToolboxRedux/3225
ANARCHIST SURVIVAL GUIDE FOR UNDERSTANDING GESTAPO SWINE INTERROGATION MIND GAMES
https://t.me/RevToolboxRedux/3230
Untitled, or What to Do When Everyone Gets Arrested
https://t.me/RevToolboxRedux/3232
The Art and Science of Billboard Improvement
https://t.me/RevToolboxRedux/3238
Basic Recon Skills (zine)
https://t.me/RevToolboxRedux/3239
COMMUNICATION EQUIPMENT FOR REBELS - Skills for Revolutionary Survival #5
https://t.me/RevToolboxRedux/3308
Your Greatest Weapon Against the State is Anonymity (image)
https://t.me/RevToolboxRedux/3328
Some useful rules for social media
https://t.me/RevToolboxRedux/10
#directory
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Video on How to Handle a Detective Visit
https://t.me/RevToolboxRedux/1823
What Is Autonomous Action?
https://t.me/RevToolboxRedux/2512
Some Protest Basics
https://t.me/RevToolboxRedux/2513
Guides for Police Provocateurs and FBI Agents
https://t.me/RevToolboxRedux/2537
Don't Become the State's Eyes (image)
https://t.me/RevToolboxRedux/2538
Digital Security Guidelines - CLDC Digital Security Program
https://t.me/RevToolboxRedux/2557
Protest Safety Planning
https://t.me/RevToolboxRedux/2596
Pittsburgh: Reflections on Leadership and Collective Autonomy
https://t.me/RevToolboxRedux/2618
Basic Guide to Protesting Safely
https://t.me/RevToolboxRedux/2689
When the Police Knock on Your Door
https://t.me/RevToolboxRedux/2711
Anti- and Counter-Surveillance Techniques for Intelligence Officers
https://t.me/RevToolboxRedux/2768
Telegram 101: How to communicate securely in Telegram?
https://t.me/RevToolboxRedux/2808
Black Bloc, Grey Bloc, and Debloc
https://t.me/RevToolboxRedux/2928
No Face No Case, 1312
https://t.me/RevToolboxRedux/2953
Reinforce Rights Not Racism (image)
https://t.me/RevToolboxRedux/2971
FM 34-2-1 Reconnaissance and Surveillance and Intelligence Support to Counterreconnaissance (1991)
https://t.me/RevToolboxRedux/2974
Hitchhikers Guide to Online Anonymity
https://t.me/RevToolboxRedux/2975
Burner Phone Best Practices
https://t.me/RevToolboxRedux/2976
Counterinsurgency in Modern Warfare (2008)
https://t.me/RevToolboxRedux/2992
Army Support to Military Deception, FM 3-13.4
https://t.me/RevToolboxRedux/2993
All Cameras Are Breakable
https://t.me/RevToolboxRedux/3000
Watch Out For Snitches (poster)
https://t.me/RevToolboxRedux/3017
Holistic Security: A Strategy Manual for Human Rights Defenders
https://t.me/RevToolboxRedux/3054
Never Turn Off The Phone: A new approach to security culture
https://t.me/RevToolboxRedux/3055
Rebel Alliance Tech Manual
https://t.me/RevToolboxRedux/3056
Secrets and Lies (story about informal organization)
https://t.me/RevToolboxRedux/3057
Digital Harm Reduction - Taking Ourselves Seriously article 1
https://t.me/RevToolboxRedux/3058
The Invisible Ground: honoring each others security needs
https://t.me/RevToolboxRedux/3059
Recording or taking photo's at a protest can be unwise (image)
https://t.me/RevToolboxRedux/3076
List of found physical surveillance devices
https://t.me/RevToolboxRedux/3086
Things I Wish I Did Before Being Raided by the Police
https://t.me/RevToolboxRedux/3087
Defend Dissent - Digital Suppression and Cryptographic Defense of Social Movements
https://t.me/RevToolboxRedux/3090
LOCKING DOWN SIGNAl (article)
https://t.me/RevToolboxRedux/3091
How To Prevent Facial Recognition Technology from Identifying You
https://t.me/RevToolboxRedux/3159
Doxxing Prevention Harm Reduction Training
https://t.me/RevToolboxRedux/3161
Damage Control - the story of how one activist group kept ourselves safe and strong in the face of movement infiltration
https://t.me/RevToolboxRedux/3162
Security and Counter-Surveillance: Information Against the Police State
https://t.me/RevToolboxRedux/3225
ANARCHIST SURVIVAL GUIDE FOR UNDERSTANDING GESTAPO SWINE INTERROGATION MIND GAMES
https://t.me/RevToolboxRedux/3230
Untitled, or What to Do When Everyone Gets Arrested
https://t.me/RevToolboxRedux/3232
The Art and Science of Billboard Improvement
https://t.me/RevToolboxRedux/3238
Basic Recon Skills (zine)
https://t.me/RevToolboxRedux/3239
COMMUNICATION EQUIPMENT FOR REBELS - Skills for Revolutionary Survival #5
https://t.me/RevToolboxRedux/3308
Your Greatest Weapon Against the State is Anonymity (image)
https://t.me/RevToolboxRedux/3328
Some useful rules for social media
https://t.me/RevToolboxRedux/10
#directory
Telegram
Revolutionary Toolbox
#security
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against…
page 1 - 2 - 3 - 4
Click here to return to the ⚒ Resource Index ⚒
Security Culture - Basics for Protests
https://t.me/RevToolboxRedux/2165
https://t.me/RevToolboxRedux/2166 - PDF version
Security and Counter-Surveillance - Information Against…
Forwarded from Enter in IT
How to find out who tried to unlock your smartphone 📱
Even if you have the most reliable password in the world, someone can try to pick it up unnoticed during your absence. In this case, it will be interesting to find out who exactly cares about your personal data.
The Lockwatch app will help you find out who tried to unlock your 📱by taking a picture from the front camera with each incorrect password entry and sending images to the specified email. In addition, you will receive the coordinates of the device if location transmission is enabled on it.
After installation, the application must be given permission to track attempts to unlock the screen, and then add a personal email and choose after which input attempt to take a picture. If the 📱 is unlocked within 10 seconds after entering an incorrect password, the message with the photo will not be sent.
#security #app
Even if you have the most reliable password in the world, someone can try to pick it up unnoticed during your absence. In this case, it will be interesting to find out who exactly cares about your personal data.
The Lockwatch app will help you find out who tried to unlock your 📱by taking a picture from the front camera with each incorrect password entry and sending images to the specified email. In addition, you will receive the coordinates of the device if location transmission is enabled on it.
After installation, the application must be given permission to track attempts to unlock the screen, and then add a personal email and choose after which input attempt to take a picture. If the 📱 is unlocked within 10 seconds after entering an incorrect password, the message with the photo will not be sent.
#security #app
Forwarded from Enter in IT
What Is a Secret Chat In Telegram And How To Use It?
If you prefer keeping the sensitive content of your chats limited to yourself and avoiding it from being intercepted by a hacker or the authorities in your country or region, this Telegram trick is for you.
Secret Chats provide user-to-user encryption. These chats are meant to be short-lived and not stored on Telegram’s servers.
🔹You can set a self-destruct timer of duration varying from one second to one week.
🔹You or the other person cannot forward messages from a Secret Chat.
🔹 Taking screenshots (or screen recordings) is completely blocked.
🔹A Secret Chat is limited between only 2 people.
To start a Secret Chat, you can tap on the option in the hamburger menu and select a contact to start the chat. Alternatively, you can go to an existing chat, tap on the top bar for the user’s information and scroll down to find the “Start Secret Chat” option.
#security #telegram
If you prefer keeping the sensitive content of your chats limited to yourself and avoiding it from being intercepted by a hacker or the authorities in your country or region, this Telegram trick is for you.
Secret Chats provide user-to-user encryption. These chats are meant to be short-lived and not stored on Telegram’s servers.
🔹You can set a self-destruct timer of duration varying from one second to one week.
🔹You or the other person cannot forward messages from a Secret Chat.
🔹 Taking screenshots (or screen recordings) is completely blocked.
🔹A Secret Chat is limited between only 2 people.
To start a Secret Chat, you can tap on the option in the hamburger menu and select a contact to start the chat. Alternatively, you can go to an existing chat, tap on the top bar for the user’s information and scroll down to find the “Start Secret Chat” option.
#security #telegram
Forwarded from Enter in IT
How to find out who leaked your documents or photos to the network
Imagine a situation: you send someone or upload a document containing personal information to any service, and then you discover that it has leaked to the network. How to find the source of the leak?
LeaksID is a service that allows you to mark confidential documents with invisible labels. In case of a leak (even in the form of a screenshot or printout), the service will analyze and calculate the source of the leak.
You can use it as just an online document converter, and get a protected PDF with invisible markings at the output.
Additional functions - document storage inside the platform and the ability to perform any necessary manipulations: download, view, print, share a link to a file. Supports all popular formats. It is free for private users (add up to 50 pages, up to 10 documents).
Will you try it?
#security #srevice
Imagine a situation: you send someone or upload a document containing personal information to any service, and then you discover that it has leaked to the network. How to find the source of the leak?
LeaksID is a service that allows you to mark confidential documents with invisible labels. In case of a leak (even in the form of a screenshot or printout), the service will analyze and calculate the source of the leak.
You can use it as just an online document converter, and get a protected PDF with invisible markings at the output.
Additional functions - document storage inside the platform and the ability to perform any necessary manipulations: download, view, print, share a link to a file. Supports all popular formats. It is free for private users (add up to 50 pages, up to 10 documents).
Will you try it?
#security #srevice
Forwarded from Enter in IT
How to access blocked sites without a VPN
If you need to visit a blocked site quickly or surf the Internet anonymously, but a VPN is not installed - the search for a reliable VPN service can take a long time.
There is a good alternative - the Startpage search engine. On request, you will get the same search results as Google, but without surveillance. You can also anonymously access any sites without leaving any traces. Just like with a VPN.
To visit the site anonymously, click on the mask icon next to the sites from the search results. A page with a secure connection will open in a new tab. Startpage works on mobile devices 📱 and PCs 💻.
#security
If you need to visit a blocked site quickly or surf the Internet anonymously, but a VPN is not installed - the search for a reliable VPN service can take a long time.
There is a good alternative - the Startpage search engine. On request, you will get the same search results as Google, but without surveillance. You can also anonymously access any sites without leaving any traces. Just like with a VPN.
To visit the site anonymously, click on the mask icon next to the sites from the search results. A page with a secure connection will open in a new tab. Startpage works on mobile devices 📱 and PCs 💻.
#security
Forwarded from Enter in IT
How to choose the most secure and appropriate browser
Everyone has their own criteria for choosing a browser, but for everyone security will be one of the most important.
The searchengines.party project was created to facilitate your choice. It is an aggregator of search engines that focus on privacy. The browser catalog contains a small summary of their security according to various criteria.
Search engines are compared here by such characteristics as logging, availability of secure protocols, the ability to disable JS support, third-party trackers, etc. The blocks are painted in different colors: from safe green 🟢 to critical red 🔴.
Study it!
#security
Everyone has their own criteria for choosing a browser, but for everyone security will be one of the most important.
The searchengines.party project was created to facilitate your choice. It is an aggregator of search engines that focus on privacy. The browser catalog contains a small summary of their security according to various criteria.
Search engines are compared here by such characteristics as logging, availability of secure protocols, the ability to disable JS support, third-party trackers, etc. The blocks are painted in different colors: from safe green 🟢 to critical red 🔴.
Study it!
#security
Forwarded from Enter in IT
Apps to Hide Your Secret Photos
You asked - here you are!😊
✅ Private Photo Vault protects your photos in a PIN or pattern protected folder. It also includes security features in case your 📱 ever get stolen, like break-in reports that will automatically take a photo of a thief and send their location via GPS.
This app uses a fake password to open decoy folders - so if you have to deal with someone poking around, they'll only see stock images. It is available on iOS and Android for free.
✅ Best Secret Folder is a password-protected app which lets you record videos and save them directly to your secret folders.The app will snap a picture of an intruder (after 4 failed login attempts) and send you their location. It is free for iOS.
Try It!
#security
You asked - here you are!😊
✅ Private Photo Vault protects your photos in a PIN or pattern protected folder. It also includes security features in case your 📱 ever get stolen, like break-in reports that will automatically take a photo of a thief and send their location via GPS.
This app uses a fake password to open decoy folders - so if you have to deal with someone poking around, they'll only see stock images. It is available on iOS and Android for free.
✅ Best Secret Folder is a password-protected app which lets you record videos and save them directly to your secret folders.The app will snap a picture of an intruder (after 4 failed login attempts) and send you their location. It is free for iOS.
Try It!
#security
Forwarded from Enter in IT
ProtonMail introduced Tracking Protection feature
Secure email provider ProtonMail launched a new protective feature called Tracking Protection. The feature aims to protect users of the service better against tracking attempts.
It will block pixel trackers in ✉️ and hide the IP addresses of recipients.
For user accounts that use the web interface of the service, this feature will be activated by default.
Do you use or did you try ProtonMail?
#security #news
Secure email provider ProtonMail launched a new protective feature called Tracking Protection. The feature aims to protect users of the service better against tracking attempts.
It will block pixel trackers in ✉️ and hide the IP addresses of recipients.
For user accounts that use the web interface of the service, this feature will be activated by default.
Do you use or did you try ProtonMail?
#security #news
Forwarded from ITeach
How to find hidden cameras indoors.
With a phone with a special sensor, you can try to find hidden cameras, microphones, computers, etc.
The Hidden Camera Detector application (available only on Android) will help us with this. If the phone is able to locate the camera, you will see a flashing red icon in the direction in which it is located.
But beware: scanners may be looking for other hardware as well, so look at the number in the middle of the screen. If it exceeds 100, it means that the phone has detected the camera.
#security
With a phone with a special sensor, you can try to find hidden cameras, microphones, computers, etc.
The Hidden Camera Detector application (available only on Android) will help us with this. If the phone is able to locate the camera, you will see a flashing red icon in the direction in which it is located.
But beware: scanners may be looking for other hardware as well, so look at the number in the middle of the screen. If it exceeds 100, it means that the phone has detected the camera.
#security