Anonymous Planet - a community contributed online guide to anonymity written for activists, journalists, scientists, lawyers, whistle-blowers, and good people being oppressed, censored, harassed anywhere
Privacy Guides [Tor] - a non-profit, socially motivated website that provides information for protecting your data security and privacy
Extreme Privacy 5th Edition - Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view
Nihilism OPSEC Blog [Tor] - ultimately, this blog aims to showcase that technology, when used correctly, can allow one to transcend any limitation. be it to transcend surveillance, centralisation, deanonymization, lack of security. any ability that we have as humans, such as privacy, decentralisation, anonymity, security, plausible deniability can be protected and enhanced by using the correct technology.
Dig Deeper [Tor] - a diverse range of articles focused on software privacy, technology critiques, societal issues, video game recommendations, and reviews, emphasizing the importance of digital security, ethical software choices, and critical perspectives on contemporary societal challenges
Shadow Wiki [Tor] - a resource dedicated to exploring topics related to nanonymity, privacy, security, and anonymity, while also delving into hardware, software, politics, religion, and obscure or esoteric knowledge, with a focus on sustainability and quality in production
Spyware Watchdog [Tor] - this website classifies spyware programs, so that users can be more aware of what they install
Anonymous Land - a community dedicated to providing anonymity enhancing guides and services
No Trace Project [Tor] - no trace, no case. a collection of tools to help anarchists and other rebels understand the capabilities of their enemies, undermine surveillance efforts, and ultimately act without getting caught
OfficerCIA - various tools and articles for OpSec, written with a preference for practical usability
PrivSec - articles written with a practical approach to privacy and security
Defending against Stylometric attacks [Tor] - stylometric fingerprinting analyzes unique writing style (i.e., it uses stylometry) to identify the author of a work. it’s one of the most common techniques for de-anonymization, used by adversaries ranging from trolls to law enforcement
Prism Break - opt out of global data surveillance programs like prism, xkeyscore and tempora.
The New Oil [Tor] - the beginner’s guide to data privacy & cybersecurity
Techlore - a small team educating people about digital rights, privacy, security, digital control, and other important topics to push the world towards a safer internet
Advanced Privacy and Anonymity Using VMs, VPN’s, Tor - a series of guides that explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation through nested chains of VPNs and Tor
EFF Surveillance Self-Defense - surveillance self-defense is a digital security guide that teaches you how to assess your personal risk from online spying. it can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states
Secure Communications Comparison - communicating securely over the internet is a must. this article compares available and actively-developed projects that are used for secure communications
Wiretapping the largest Russian XMPP server - xmpp (jabber) instant messaging protocol encrypted tls connection wiretapping (man-in-the-middle attack) of jabber[.]ru (aka xmpp[.]ru) service’s servers on hetzner and linode hosting providers in germany
XMPP: Admin-in-the-middle - in our opinion, you can’t refer to xmpp-based messaging as “privacy-friendly” as long as you don’t control all xmpp servers. an xmpp administrator (or any other server-side party) can inject arbitrary messages, modify address books, and log passwords in cleartext
Matrix linked Amdocs found tapping South African cell phones - south african agents wrote in a 2009 document that they suspected that israel’s secret service, mossad, was using israeli software giant amdocs to eavesdrop on mobile phone conversations and gather data
Desktop Linux Hardening - a guide that intermediate to advanced Linux users can reasonably follow to set up and maintain hardened security configurations
Linux - an article debunking common misunderstandings on desktop Linux’s security model.
Linux Hardening Guide - how to harden Linux as much as possible for security and privacy
Email (In)security - email is an inherently insecure protocol, conceived at a time when security was an afterthought
Fingerprinting Articles
NetworkManager Minor Hardening - MAC address randomization, removing static hostname to prevent hostname broadcast, and disabling sending hostname to DHCP server
Privacy Check - this website aims to focus on each fingerprinting technique in detail
scheme flooding - this vulnerability uses information about installed apps on your computer to assign you a permanent unique identifier even if you switch browsers, use incognito mode, or use a VPN.
SuperCookie - uses favicons to assign a unique identifier to website visitors. this ID can be stored almost persistently and cannot be easily cleared by the user
Webgl Fingerprinting - uses different techniques to recognize whether a browser extension is spoofing the webgl fingerprint
Zardaxt.py - TCP/IP fingerprinting for VPN and Proxy Detection
Surveillance Technology
Ears and Eyes - searchable database of cases of physical surveillance devices (microphones, cameras, location trackers) hidden by law enforcement and intelligence agencies to surveil people or groups engaged in subversive activities
Bugged Planet - a wiki about signals intelligence (SIGINT), communication intelligence (COMINT), tactical and strategical measures used to intercept communications and the vendors and governmental and private operators of this technology
Harris: Wide Area Airborne Motion Imagery - wide-area motion imagery offers persistent, real-time surveillance for enhanced situation awareness through an intelligent, airborne sensor system
Harris: Locate GPS Jamming - harris signal sentry 1000 is a gps interference detection and geolocation solution. it provides a web-based visualization tool to support timely and effective actionable intelligence.
Harris: Material Identification - harris material identification technology enables remote sensing systems to detect, identify and geolocate the presence of solid materials and gasses – on earth and in the atmosphere
Elbit Systems / SPECTRO XR - spectro xr integrates a wide range of digital imaging, high-definition optical sensors and advanced lasers, providing simultaneous multi-spectral observation capabilities and enabling ultra-long-range detection.
Police thermal imaging finds cannabis factory - It was a case of being caught red handed when the West Midlands Police helicopter found this cannabis factory using its thermal imaging camera
How Police Cameras Recognize and Track You - wired spoke with several experts about the explosion of surveillance technology, how police use it, and what the dangers might be. as tech advances, street cameras can now employ facial recognition and even connect to the internet. what does this mean for the future of privacy?
How China’s Surveillance Is Growing More Invasive - analysis of over 100,000 government bidding documents found that China’s ambition to collect digital and biological data from its citizens is more expansive and invasive than previously known
Homeland Security Uses AI Tool to Analyze Social Media of U.S. Citizens and Refugees - babel x may provide to analysts a target’s name, date of birth, address, usernames, email address, phone number, social media content, images, IP address, Social Security number, driver’s license number, employment history, and location data based on geolocation tags and also cell phone gps tracking