Skip to Content

🛡️ Security Response

    🛡️ Security Response

    • Home
    • About
    • Blog

    Blog

    1. Home
    15 Mar, 2017
    Tutanota
    Tutanota
    encrypted mail, secure email, tutanota

    About Tutanota Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox. With its unique open source technology Tutanota fights for privacy and freedom of speech online. Started as a secure email service in 2011, Tutanota

    Continue ReadingTutanota

    1 Feb, 2017
    Tresorit
    Tresorit
    cloud storage, e2ee, encryption, end-to-end encryption, files, privacy, private storage, secure storage, tresorit, zero-knowledge content

    Secure cloud collaboration, made easy Tresorit is the ultra-secure place in the cloud to store, sync, and share files within your organization and with external partners. Tresorit is a Swiss, end-to-end encrypted, zero-knowledge content collaboration platform designed to safeguard the

    Continue ReadingTresorit

    11 Aug, 2016
    Bitwarden
    Bitwarden
    2fa, authentication, bitwarden, password manager, passwords, pw manager

    The Most Trusted Open Source Password Manager for Business Bitwarden offers the easiest and safest way for teams and individuals to store and share sensitive data from any device. Secure Your Passwords From Any Location or Device Bitwarden gives you

    Continue ReadingBitwarden

    1 Aug, 2016
    Element
    Element
    chat app, element, encryption, matrix, matrix network, messenger, secure chat

    Own your conversations Element is an all-in-one secure chat app for teams, friends and organizations. Keeps conversations in your control, safe from data-mining and ads. Talk to everyone through the open global Matrix network, protected by proper end-to-end encryption. Element

    Continue ReadingElement

    1 Nov, 2015
    Pine64
    Pine64
    arm, computers, foss, linux, notebooks, phones, pine64, risc-v, smartphones

    Pine64 is an organization which designs, manufactures and sells single-board computers, notebook computers and smartphones. While Pine64 is a legal for-profit entity, it operates much like a non-profit organization in the sense that it does not draw profits from most

    Continue ReadingPine64

    14 Aug, 2015
    ProtonMail
    Proton, ProtonMail
    encrypted email, open source, proton, protonmail, secure mail, vpn

    End-to-End Encryption Messages are encrypted and stored on ProtonMail servers at all times. They are also transmitted in encrypted format between our servers and user devices. Messages between ProtonMail users are also transmitted in encrypted form within our secure server

    Continue ReadingProtonMail

    1 Aug, 2014
    Ledger
    Ledger
    bitcoin, cryptocurrency, ethereum, hardware wallet, ledger, litecoin, secure, wallet

    Ledger is a hardware cryptocurrency wallet which stores the user’s private keys, critical piece of information used to authorize outgoing transactions on the blockchain network, in a secure hardware device. The main principle behind hardware wallets is to provide full

    Continue ReadingLedger

    19 Apr, 2014
    Monero (XMR)
    Monero
    blockchain, crypto, cryptocurrency, monero, private, xmr

    Monero is the leading cryptocurrency focused on private and censorship-resistant transactions. The majority of existing cryptocurrencies, including Bitcoin and Ethereum, have transparent blockchains. Transactions can be verified and/or traced by anyone in the world. This means that the sending and

    Continue ReadingMonero (XMR)

    1 Jun, 2013
    Trezor
    Trezor
    bitcoin, cryptocurrency, ethereum, hardware wallet, litecoin, secure, trezor, wallet

    Trezor is a hardware wallet providing advanced security for handling Bitcoin and other cryptocurrencies private keys. Unlike traditional cold storage methods, offline storage or paper wallets, Trezor makes secure payments without exposing your private keys to a potentially compromised computer. Learn more: https://trezor.io

    1 Mar, 2012
    Whonix
    Whonix
    anonymity, anonymous, ip address, linux, mac, qubes, tor, vpn, whonix, windows

    What is Whonix? Whonix is software designed to preserve privacy and anonymity by helping users run applications anonymously. Whonix can be installed on Windows, macOS and Linux. Whonix also comes pre-installed in Qubes (Qubes-Whonix). How does Whonix work? To protect

    Continue ReadingWhonix

    1 Nov, 2011
    Sync
    Sync
    cloud storage, e2ee, encryption, end-to-end encryption, files, privacy, private storage, secure storage, sync, zero-knowledge content

    Everything in Sync Sync makes it easy to store, share and access your files from just about anywhere. Best of all, Sync protects your privacy with end-to-end encryption — ensuring that your data in the cloud is safe, secure and

    Continue ReadingSync

    10 Jan, 2009
    Bitcoin (BTC)
    Bitcoin
    bitcoin, blockchain, btc, crypto, cryptocurrency, open source

    Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of bitcoins is carried out collectively by the network. Bitcoin is open-source; its design is public, nobody owns or controls Bitcoin and everyone

    Continue ReadingBitcoin (BTC)

    1 Jan, 2006
    System76
    System76
    computer, hardware, laptop, linux, system76

    System76 is an American computer manufacturer based in Denver, Colorado, specializing in the sale of notebooks, desktops, and servers. The company supports free and open-source software, offering either Ubuntu or their own Ubuntu-based Linux distribution, Pop!_OS, as the preinstalled operating

    Continue ReadingSystem76

    1 Oct, 2002
    Tor
    Tor
    anonymity, anonymous, browser, dark web, deep web, private, tor, tor network

    Defend yourself against tracking and surveillance. Circumvent censorship Everyone should be able to explore the internet with privacy. The Tor Project is a 501(c)(3) US nonprofit. They advance human rights and defend your privacy online through free software and open

    Continue ReadingTor

    Posts pagination

    1 2
    Copyright © 2025 🛡️ Security Response | Powered by Neom