Categories
Mullvad

Mullvad VPN

Evade hackers and trackers

When you connect to the internet with Mullvad, we ensure that the traffic to and from your device is encrypted to the highest standards even if you are using a public WiFi network at a cafe or hotel.

Keep your privacy

We keep no activity logs, do not ask for personal information, and even encourage anonymous payments via cash or one of the cryptocurrencies we accept. Your IP address is replaced by one of ours, ensuring that your device’s activity and location are not linked to you.

Easy to use

Using Mullvad is straightforward and simple – just download and install the app. You won’t need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind.

Learn more: https://mullvad.net

Categories
Qubes OS

Qubes OS – Overview/Demo

Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems.

Learn more: https://www.qubes-os.org

Categories
IVPN

IVPN

We consider the effects of our choices with regarding to running our service. We follow a privacy-first mindset that goes beyond the basics.

Every decision matters: how and what we communicate to new customers, what information we collect and what tools we use to improve our service. We believe in leading by example, and commit to the following:

No personal information

We aim for zero user information collected as defined in our concise privacy policy. We don’t ask for your email address or any other personal information.

No trackers

Trackers by ad companies and social networks monitor your actions and aid in profiling you. You won’t find them on ivpn.net – we are a tracking free provider.

No third-party tools

Tools like Google Analytics collect personally identifiable information. We use software hosted only on IVPN controlled servers to ensure your privacy.

No secrets

IVPN’s ownership, company structure and team is public, so you know who is responsible for protecting your privacy.

No false promises

Some services try to convince everyone to get a VPN and become anonymous online. We don’t advertise benefits that are not attainable by using a VPN.

Openness and accountability

Our applications are open source and available for review on our GitHub page. We commission regular audits to back up our claims.

Learn more: https://www.ivpn.net

Categories
Qubes OS

Qubes OS: Security Oriented OS

Learn more: https://www.qubes-os.org/

Categories
Qubes OS

Qubes OS: The OS That Can Protect You Even If You Get Hacked

Learn more: https://www.qubes-os.org/

Categories
Tails

Chat on Tails

Learn more: https://tails.boum.org/

Categories
Tails

Introduction to Tails

Learn more: https://tails.boum.org/

Categories
Tails

Getting Tails

Learn more: https://tails.boum.org/

Categories
Tails

Persistence on Tails

Learn more: https://tails.boum.org/

Categories
Subgraph OS

Subgraph OS

Adversary-Resistant Computing Platform

Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borne exploit and malware attacks. It is also meant to be familiar and easy to use. Even in alpha, Subgraph OS looks and feels like a modern desktop operating system.

Subgraph OS includes strong system-wide attack mitigations that protect all applications as well as the core operating system, and key applications are run in sandbox environments to reduce the impact of any attacks against applications that are successful.

Subgraph OS was designed to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks. Subgraph OS is designed to be difficult to attack. This is accomplished through system hardening and proactive, ongoing research on defensible system design.

Learn more: https://subgraph.com

Categories
Ledger

Ledger

Ledger is a hardware cryptocurrency wallet which stores the user’s private keys, critical piece of information used to authorize outgoing transactions on the blockchain network, in a secure hardware device. The main principle behind hardware wallets is to provide full isolation between the private keys and your easy-to-hack computer or smartphone.

Ledger is developing hardware wallet technology that provides the highest level of security for crypto assets. Their products combine a Secure Element and a proprietary OS designed specifically to protect your assets. Ledger hardware wallets empower you with the ownership and control of your private keys.

Learn more: https://www.ledger.com

Categories
Trezor

Trezor

Trezor is a hardware wallet providing advanced security for handling Bitcoin and other cryptocurrencies private keys.

Unlike traditional cold storage methods, offline storage or paper wallets, Trezor makes secure payments without exposing your private keys to a potentially compromised computer.

Learn more: https://trezor.io