quinta-feira, 3 de julho de 2014

10 Free Crypto Apps To Help Protect Your Online Privacy

Many of us have uploaded a lives onto a Internet, to a indicate that we can't suppose vital though it. We use online services that we entrust to keep a information secure and private. Unfortunately, many of us don’t comprehend that it’s not truly secure as they are theme to many third parties that can perspective a content, from a association providing a use to a supervision itself.


Most of a time, we competence not mind this though sometimes, it’s improved to be protected than sorry. From supportive personal information to work associated materials, we all have information that we wish to keep private. When we use a word crypto, we meant that these apps will assistance we make many of your online activity more secure and private, helmet it from being spied upon. With that said, here are 10 giveaway apps that will assistance we strengthen your online privacy.



1. Tails OS (Operating System)


Tails (The Amnesic Incognito Live System) is built on a thought of privacy and anonymity for a user. Everything that could be finished and each apparatus that could assistance has been combined to a OS. For one, it is a live OS, meant to be run on a CD or a USB drive, withdrawal positively no snippet of your activity on a computer’s drive.


Second is that each singular tie by a internet must be relayed by a Tor network, definition that your online activity will be anonymized. Every app in a OS has been configured with remoteness and remoteness in mind. For example, both a e-mail and messaging customer includes encryption tools. [Get it here]


Tails


2. Replicant (Operating System)


Replicant is a mobile OS formed on Android that aims to reinstate each singular bit of exclusive program on a phone with free (as in speech) software. The logic behind this is that those exclusive components could have a backdoor access in them to your phone and data. With giveaway software, a source will be open and can be subjected to scrutiny.


Currently, Replicant is means to run mostly on Samsung devices, especially a Galaxy S array and all of a program enclosed is giveaway software, definition no Google Apps such as Gmail, Maps, Play Store, etc. It comes with a possess app store, F-Droid, that is filled usually with free, open source software. [Get it here]


Replicant


3. Tor Browser (Web Browser)


We have quickly lonesome a Tor Project on this site before and how it works. As a brief recap, Tor works by bouncing your online activity by several send proxies that are partial of a Tor network. Doing so will assistance problematic a indicate of start and a requested calm done from your machine.


The Tor Browser is a mutated chronicle of Firefox that is supposing by a Tor Project, that gives a user an easy approach to entrance a Tor network. In further to Tor, a browser includes other collection to assistance with a anonymizing process, including NoScript (to forestall any arrange of book from running) and HTTPS-Everywhere, that enables HTTPS on websites by default. [Get it here]


Tor Browser



4. OwnCloud (Online Storage)


When we are regulating an online storage provider such as Dropbox or Google Drive, we are trusting them with your information and a security. There have been several instances where a confidence of a information hold by these companies have been compromised. The best resolution is to emanate your possess cloud.


OwnCloud allows we to build your own, personal cloud, where we control all about it, from a hoop distance to a hardware. There is no third celebration concerned in doing your data, definition that a chances of someone peeking into your information is lower. The usually one obliged and in assign of a remoteness and confidence of your information is you. [Get it here]


OwnCloud



5. Boxcryptor (Online Storage)


Even with a risks, there are still reasons to use a third celebration online storage provider. It’s easy, inexpensive and convenient. In this case, there are ways to strengthen your online information from being pried upon. The best approach is to encrypt a data stored on your online drive, so that no one will be means to perspective a contents.


Enter Boxcryptor, an app that will easily concede we to encrypt a files that live on your online storage drives. Boxcryptor will work on a vital online storage providers and uses AES-256 and RSA encryption algorithms. The keys to decrypt your information are yours alone so even a association that combined Boxcryptor can't decrypt your data. [Get it here]


Boxcryptor



6. ProtonMail (Email)


The infancy of us rest on email in a day-to-day lives. Most people would prefer it that a emails are kept private, as some of them might enclose supportive information associated to work or a private lives. While many of a vital email providers have some arrange of remoteness collection to strengthen your email, most of them have a ability to review your email, if they wanted.


ProtonMail is a use now in beta and we have to ask for an entice to emanate an comment though it promises to offer an easy approach to keep your email protected and secure from any form of snooping. ProtonMail offers end-to-end encryption and no one though a chairman who binds a pivotal to decrypt them can benefit access, not even ProtonMail themselves. ProtonMail is cross platform and we can still send encrypted and unencrypted email to other services. [Get it here]


ProtonMail



7. Cryptocat (Messaging)


Everyone loves to promulgate with a good messaging app. Did we know that WhatsApp alone processes some-more that 20 billion messages a day? And what if we told we that that those 20 billion messages are not totally secure? While many of those sent are not critical adequate to validate for any protection, some people might need a messaging app that provides confidence and privacy.


Crytocat is a renouned messaging app that will encrypt your messages before it leaves for a dictated recipient. It is easy to use and set up, vital as an prolongation in your browser or as an app. The use uses Off-The-Record Messaging, a custom that is designed to encrypt present messaging conversations, definition usually we and a target will have entrance to a messages. [Get it here]


CryptoCat



 


8. Pidgin (Messaging)


Pidgin is a versatile, multi-platform present messaging client, vouchsafing we discuss with many of a online discuss services that we might already be using, such as Facebook, so we can have all of your discuss sessions underneath one app. The app is free and open source, so a source formula can be noticed and studied.


The categorical reason that a app is on a list is a ability to supplement Off-The-Record Messaging on tip of a those protocols. For example, with Pidgin, we and your friends are means to have a encrypted review over Facebook, definition no one though we and a dictated target will have entrance to a messages, not even Facebook. [Get it here]


Pidgin


9. Linphone (Telephony)


If we wish an internet phone app that is both secure and encrypted, with shield from wiretapping, Linphone provides both a use and app that can assistance we with that. Linphone is another giveaway and open source app that lets we place calls regulating a customary famous as Session Initiation Protocol (SIP), that is an open protocol, distinct Skype, that is closed.


In further to a app, Linphone has a use where we can create your possess SIP account with them to get we started regulating a app. The good thing about a SIP comment is that we are not tied in to a app, and can be used by other telephony apps that support SIP. [Get it here]


Linphone


10. OnionShare (File Sharing)


A new, command line formed app combined in Python and combined by Micah Lee, who works for Glenn Greenwald’s The Intercept news site. If a name Glenn Greenwald doesn’t ring a bell, he is a contributor who pennyless a news about a NSA leaks. The app has a singular purpose, that is to concede we to share your files by a internet anonymously by Tor.


It does this by regulating a Tor dark services. When we share a file, a app will emanate an unguessable .onion URL, that can usually be accessed by regulating a Tor Browser, ensuring anonymity for a parties involved. To share a file, we will have to pass on a .onion URL to a dictated recipient. [Get it here]





10 Free Crypto Apps To Help Protect Your Online Privacy

Nenhum comentário:

Postar um comentário