Source: The
Ultimate Privacy Guide
Ladies
and Gentlemen, here it is. We’ve put a lot of effort into this, and it’s very
long. We tried to think of every angle in terms of privacy, and the effort was
worth it. Almost 13,000 words about how to protect your privacy online. There’s
no need to read it at once, just check the index below and click on the parts
that interest you.
If
you want to contribute, please leave a comment at the bottom!
Update 08 May 2014: in addition to many minor updates, we have included a whole
new section on the Heatbleed Bug, have completely revamped the section on
Encryption to better reflect the ongoing revelations about the NSA’s concerted
attempt to subvert all encryption standards (possibly with NIST help), and have
noted the results of the first phase of the ongoing audit of TrueCrypt.
Update 17 June 2014: in a move that is as surprising as it is baffling, the
devs behind TrueCrypt have pulled the plug on the popular full-disk
encryption program. Conspiracy theories abound, and while some developers seek
to fork the software, Phase II of the audit goes ahead. For more details on the
story seehere and here. Until the audit is complete, we strongly
suggest avoiding TrueCrypt, and migrating TrueCrypt containers to other
programs, such as toDiskcryptor for Windows users, or Dm-crypt/LUKS and bwalex/tc-play (a
free TrueCrypt Implementation based on dm-crypt)
for Linux users.
Index
·
Ciphers
·
NIST
·
Metadata
·
Bitcoin
·
VPN
·
Tor
·
Use TrueCrypt
o Auditing the code
o Mobile options
No comments:
Post a Comment