![]() Plug and play cjdns appliance, offering a distributed and end-to-end encrypted telephony and email service. Validating, recursive, and caching DNS server.Ī full range of privacy-aware services including hosting, VPNs, email, IM, and more. Open, democratic, and anti-censorship DNS provider. Secure communications between a client and a DNS resolver.ĭistributed DNS for the. Your ip-address is also stored for 24 hours.ĭNS hosting with DNSCrypt, DNSSec, and Namecoin support. Google Public DNS permanently logs your ISP and location information for analysis. Warning: Don't use Symantec Drive Encryption! POSIX-compliant enterprise cryptographic stacked filesystem for GNU/Linux.įile based encryption tool with support for GNU/Linux, OS X and Windows. Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages, and other communication forms", back to the user and is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored.Ī free software disk space cleaner, privacy manager, and computer system optimizer.Ī convenience and ease-of-use layer for use on top of dm-crypt. ![]() ![]() Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than four thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis. We strongly recommend replacing Windows with either Linux or Computerĭecentralized censorship-resistant network.įree software for enabling online anonymity. Warning: Microsoft Windows is affected by PRISM. PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |