Categories
Tutanota

Tutanota

About Tutanota

Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox. With its unique open source technology Tutanota fights for privacy and freedom of speech online. Started as a secure email service in 2011, Tutanota now offers an encrypted address book, an encrypted calendar and the encrypted contact form Secure Connect.

In addition, Tutanota’s affordable business version enables companies and organisations of all sizes to easily secure their email communication.

Mission

Privacy is the foundation of everything we do. To fight for our right to privacy – to protect journalists, whistleblowers and human rights activists as well as citizens around the world – this has been our mission since we have started building the encrypted email service Tutanota.

Join us in our mission to spread privacy via our community page.

We embrace full transparency and disclose mistakes openly and transparently. Security and transparency are closely interlinked and one cannot be achieved without the other.

We take our social responsibility seriously by running Tutanota completely on renewable energy and by offering the secure email service at a discount to NPOs and schools.

Team Spirit

√ Courage: We discuss conflicts, admit mistakes and propose ideas even if they may sound silly at first. We ask for help and offer help to each other if needed.

√ Responsibility: We decide on strategy, planning and design in teams. We incorporate pair programming.

√ Appreciation: We appreciate each other’s ideas and accomplishments.

√ Respect: We respect each other and their opinions.

Learn more: https://tutanota.com

Categories
Tresorit

Tresorit

Secure cloud collaboration, made easy

Tresorit is the ultra-secure place in the cloud to store, sync, and share files within your organization and with external partners.

Tresorit is a Swiss, end-to-end encrypted, zero-knowledge content collaboration platform designed to safeguard the digital valuables of individuals and organizations with the highest classification in the cloud.

Share files securely with anyone, inside and outside your organization

Replace risky email attachments with encrypted links. Tresorit empowers you to send and receive files safely from anyone – even non Tresorit users.

Access your work documents from anywhere, at any time, on any device

Stay productive on the go and enjoy enterprise-level data security wherever you are. Tresorit is available across all devices and on all browsers.

Keep your stored files safe from unauthorized access and data breaches

Get the highest standard of data security in the cloud. Tresorit’s patented zero-knowledge encryption safeguards your confidential documents.

Make compliance with data protection regulations simple

Ensure compliance with regulations like the ISO, CCPA, HIPAA, and more. Tresorit helps businesses avoid noncompliance fines and reputational damage.

Learn more: https://tresorit.com/

Categories
Bitwarden

Bitwarden

The Most Trusted Open Source Password Manager for Business

Bitwarden offers the easiest and safest way for teams and individuals to store and share sensitive data from any device.

Secure Your Passwords From Any Location or Device

Bitwarden gives you power to create and manage unique passwords, so you can strengthen privacy and boost productivity online from any device or location.

Enterprise-Grade Security and Compliance

Protect your online data using a password manager you can trust. Bitwarden conducts regular third-party security audits and is compliant with Privacy Shield, HIPAA, GDPR, CCPA, and SOC 2 security standards.

Learn more: https://bitwarden.com

Categories
Element

Element

Own your conversations

Element is an all-in-one secure chat app for teams, friends and organizations. Keeps conversations in your control, safe from data-mining and ads. Talk to everyone through the open global Matrix network, protected by proper end-to-end encryption.

Element is a messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe.

A part of the Matrix ecosystem

Matrix is an open network for secure, decentralised communication, connecting 33M+ users over 75K+ deployments. Governed by The Matrix.org Foundation, the Matrix protocol is an open standard with open source implementations, supporting a vibrant developer ecosystem. Element was founded by the team behind Matrix as a way to bring it to the mainstream.

Element is an open source company

Element is incredibly proud to build in the open, contributing almost all of our own code to everyone.

Learn more: https://element.io

Categories
Pine64

Pine64

Pine64
PinePhone

Pine64 is an organization which designs, manufactures and sells single-board computers, notebook computers and smartphones. While Pine64 is a legal for-profit entity, it operates much like a non-profit organization in the sense that it does not draw profits from most device sales, operates with volunteers, and reinvests income from sales back into the company. Its name was inspired from the mathematical constants pi and e with a reference to 64-bit computing power.

The Pine64 community is large, vibrant and diverse. Independent and partner-project developers, hackers and hardware enthusiasts, privacy advocates and FOSS geeks – you name it, we’ve got ’em all. They all contribute to the project thereby shaping it and determining its course. This page is community run, as is the Wiki, the chats as well as the forums.

Our goal is to push the envelope and deliver Arm and RISC-V devices that you want to use and develop for. To this end, we actively work with the development community and champion end-user initiatives. Rather than applying business to a FOSS setting, we allow FOSS principles to guide our business.

Learn more: https://pine64.com

Categories
Proton ProtonMail

ProtonMail

End-to-End Encryption

Messages are encrypted and stored on ProtonMail servers at all times. They are also transmitted in encrypted format between our servers and user devices. Messages between ProtonMail users are also transmitted in encrypted form within our secure server network. Because data is encrypted at all steps, the risk of message interception is largely eliminated.

Zero Access to User Data

ProtonMail’s zero access architecture means that your data is encrypted in a way that makes it inaccessible to us. Data is encrypted on the client side using an encryption key that we do not have access to. This means we don’t have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties. With ProtonMail, privacy isn’t just a promise, it is mathematically ensured. For this reason, we are also unable to do data recovery. If you forget your password, we cannot recover your data.

Open Source Cryptography

We use only secure implementations of AES, RSA, along with OpenPGP. Furthermore, all of the cryptographic libraries we use are open source. By using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors. ProtonMail’s open source software has been thoroughly vetted by security experts from around the world to ensure the highest levels of protection.

Learn more: https://protonmail.com

Categories
Ledger

Ledger

Ledger is a hardware cryptocurrency wallet which stores the user’s private keys, critical piece of information used to authorize outgoing transactions on the blockchain network, in a secure hardware device. The main principle behind hardware wallets is to provide full isolation between the private keys and your easy-to-hack computer or smartphone.

Ledger is developing hardware wallet technology that provides the highest level of security for crypto assets. Their products combine a Secure Element and a proprietary OS designed specifically to protect your assets. Ledger hardware wallets empower you with the ownership and control of your private keys.

Learn more: https://www.ledger.com

Categories
Monero

Monero (XMR)

Monero is the leading cryptocurrency focused on private and censorship-resistant transactions.

The majority of existing cryptocurrencies, including Bitcoin and Ethereum, have transparent blockchains. Transactions can be verified and/or traced by anyone in the world. This means that the sending and receiving addresses of these transactions could potentially be linked to real-world identities.

Monero, on the other hand, uses various privacy-enhancing technologies to ensure the anonymity of its users.

Monero transactions are confidential and untraceable.

Unlike selectively transparent alternatives (e.g. Zcash), Monero is the only cryptocurrency where every user is anonymous by default. The sender, receiver, and amount of every single transaction are hidden through the use of three important technologies: Stealth Addresses, Ring Signatures, and RingCT.

Because every transaction is private, Monero cannot be traced. This makes it a true, fungible currency. Merchants and individuals accepting Monero do not need to worry about blacklisted or tainted coins.

Monero is electronic cash that allows fast, inexpensive payments to and from anywhere in the world.

With Monero, there are no wire transfer or check clearing fees, no multi-day holding periods, and no fraudulent chargebacks. Because Monero is decentralized, it is not constrained by any particular legal jurisdiction and provides safety from capital control.

Monero is a grassroots community attracting the world’s best cryptocurrency researchers and engineering talent.

The Monero Project is at the forefront of cryptocurrency privacy and security. Its Research Lab and Development Team are constantly working on new, innovative technologies. Since its launch, the project has received contributions from over 500 developers located all around the world.

Numerous forums and chat channels are available for anyone to join, and the community is always welcoming new members.

Learn more: https://www.getmonero.org

Categories
Trezor

Trezor

Trezor is a hardware wallet providing advanced security for handling Bitcoin and other cryptocurrencies private keys.

Unlike traditional cold storage methods, offline storage or paper wallets, Trezor makes secure payments without exposing your private keys to a potentially compromised computer.

Learn more: https://trezor.io

Categories
Whonix

Whonix

What is Whonix?

Whonix is software designed to preserve privacy and anonymity by helping users run applications anonymously. Whonix can be installed on Windows, macOS and Linux. Whonix also comes pre-installed in Qubes (Qubes-Whonix).

How does Whonix work?

To protect a user’s anonymity on the internet, all connections are forced through the Tor network and numerous security mechanisms are deployed.

What are the Advantages of Whonix?

Whonix realistically addresses common attack vectors.

An IP address is a label which is used to identify a computer on the Internet. A simple analogy is an IP address is similar to a car license plate.

Hiding IP addresses is technically difficult for software. There is always a risk of so-called IP leaks, whereby a user mistakenly thinks the IP address is hidden when it is actually not.

Whonix is the best solution to prevent IP leaks because it uses a more solid technical design. IP leak issues that previously applied to other software were not applicable to Whonix in a number of cases.

IP leaks are not the only issue that can break a user’s anonymity. Other threats include time attacks, keystroke deanonymization and data collection techniques. Whonix deploys numerous security mechanisms to mitigate such attacks.

How is Whonix different from a VPN?

Virtual Private Networks (VPNs) know your identity and online activity and can be compelled legally to share this information with authorities under various circumstances.

VPNs are usually faster than Tor, but they are not anonymity networks. VPN administrators can log both where a user is connecting from and the destination website, breaking anonymity in the process. Promises made by VPN operators are meaningless, since they cannot be verified. Tor provides anonymity by design rather than policy, making it impossible for a single point in the network to know both the origin and the destination of a connection. Anonymity by design provides much more security, since trust is removed from the equation.

Whonix isn’t a program like most of your applications. It’s a full operating system that runs inside your current one.

Learn more: https://www.whonix.org

Categories
Sync

Sync

Everything in Sync

Sync makes it easy to store, share and access your files from just about anywhere.

Best of all, Sync protects your privacy with end-to-end encryption — ensuring that your data in the cloud is safe, secure and 100% private.

Keep your files safe, secure and 100% private

Sync’s encrypted cloud storage platform protects your privacy by ensuring that only you can access your data. Your confidential documents are completely safeguarded from unauthorized access, which is the only way you can truly trust the cloud.

Share any kind of file with anyone, quick and easy

With Sync you can send files of any size to anyone, even if they don’t have a Sync account. Multiple users can work from the same set of folders, and features such as file requests, password protection, notifications, expiry dates and permissions ensure that you’re always in control.

Access your files from anywhere

Sync backs up your files automatically, all in one centralized location, and keeps them synced across all of your computers and devices. With apps for Windows, Mac, iPhone, iPad, Android and the web, you’ll never lose a file again.

Learn more: https://www.sync.com/

Categories
Bitcoin

Bitcoin (BTC)

Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of bitcoins is carried out collectively by the network. Bitcoin is open-source; its design is public, nobody owns or controls Bitcoin and everyone can take part. Through many of its unique properties, Bitcoin allows exciting uses that could not be covered by any previous payment system.

Learn more: https://bitcoin.org

Categories
System76

System76

System76 is an American computer manufacturer based in Denver, Colorado, specializing in the sale of notebooks, desktops, and servers. The company supports free and open-source software, offering either Ubuntu or their own Ubuntu-based Linux distribution, Pop!_OS, as the preinstalled operating system.

Learn more: https://system76.com

Categories
Tor

Tor

Defend yourself against tracking and surveillance. Circumvent censorship

Everyone should be able to explore the internet with privacy. The Tor Project is a 501(c)(3) US nonprofit. They advance human rights and defend your privacy online through free software and open networks.

Block Trackers

Tor Browser isolates each website you visit so third-party trackers and ads can’t follow you. Any cookies automatically clear when you’re done browsing. So will your browsing history.

Defend Against Surveillance

Tor Browser prevents someone watching your connection from knowing what websites you visit. All anyone monitoring your browsing habits can see is that you’re using Tor.

Resist Fingerprinting

Tor Browser aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information.

Multi-Layered Encryption

Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays.

Browse Freely

With Tor Browser, you are free to access sites your home network may have blocked.

Learn more: https://www.torproject.org