Safety
Feb 1st: Updates in all three pages!

Safety

There is a huge difference between general privacy and safety rules for people in life-threatening situations. We will separate them because people in occupied territories, partisans, and activists need more protection than others. But anyway, we recommend using maximum tools for people in dangerous situations, even if it just increases your general privacy.

Note: most of applications are for either Windows or Android, or multi-platform. We will add more for other platforms later (Linux-based, MacOS, etc).

  1. First rule of anonymity: despite all these tools, the main enemy of anonymity is the person themselves. Be aware of what information you choose to reveal, what photos you share, and how many of your accounts are connected.
  2. Second rule of anonymity: make a threat model. Think about what kind of situation you are in. Are you a privacy-conscious person who just doesn't want google to steal your data? Are you an activist whose freedom could be at risk? Are you on occupied territory and your life is in danger? Use as many tools as you feel, but do not underestimate the risks.
  3. Third rule of anonymity: do not use any russian services. Any. At all. Especially if it poses itself like a safety or privacy tool.

Existing guides and lists

There are plenty of comprehensive websites and tutorials, that already exist. Our website is just a hand-picked list of the tools we trust to, but we are not the professionals. Some of the guides will be included once more into the lists to be sure you'll read them. Check these things below, and come back if you still will need some more tools from us:

Teams and projects

Some teams provide many services at once, and you are able to choose from it. It could be Mail, Cloud, Fediverse instance, etc. We will take some of these to the lists below anyway.

Messaging and mail

Alternatives

Search

Browser

  • Librewolf
  • palemoon. for older versions of Windows.
  • monocles browser. Android browser.
  • $ Mullvad browser.
  • Ceno. Access web content through a network of cooperating peers - even when the internet is down or censored. With it, Ceno users create small-world networks to connect to each other, and thereafter to a bridge outside the censored zone. Read more about it here, it's a short and simple non-technical explanation.

Maps

Apps store

Cloud drive

Documents

Keyboard (for mobile devices)

Online meetings

  • Matrix. It has video calls.
  • Signal. It has video calls.
  • newponder.us. Place to meet by Good Enough.

Life-saving tools

  • newDNS0. The European public DNS. Simple tutorials inside! Works for desktop browsers and phones!
  • newpassword generator. To generate strong passwords.
  • Monero. Decentralized cryptocurrency.
  • Tor. Tor User Manual and app.
  • Fake Traveler. Fakes your location.
  • Timed Shutdown. Emulates manual gestures to power off the phone, no root.
  • Keep Alive. Android app to notify others if you haven't used your device in a given period of time.
  • Wasted. Locks your mobile and wipe info on emergency.
  • Ripple. "Panic button" app. Read more about this.
  • Silence. Encrypted SMS/MMS Android app.
  • Aegis Authenticator. For 2-step verification.
  • FileMail. Share large files up to 5 GB free using email or a secure link.
  • Proton VPN. Note: Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic!
  • Password Safe. Multiplatform password keeper.
  • PrivateBin. Online pastebin where the server has zero knowledge of pasted data.
  • privacy blur. To obfuscate sensitive areas in images. Not for text! Example of use: blur surroundings or faces on the photos.