asteroza + privacy   529

e · GitLab
Appears to be an attempt to do AOSP while removing google tracking hooks
AOSP  android  OS  alternative  privacy  anonymity 
5 weeks ago by asteroza
Nope Sound - Microphone Blocker (2 PACK) – Bungajungle
Fake out your phone to assume the presence of an external mic, which auto-shuts off most onboard mics. Will do nothing for you jackless USB-C heathens though
fake  mic  microphone  smartphone  audio  privacy  hardware 
december 2018 by asteroza
test your client to see how much it leaks. Notably, that google will fetch gmail images on access, so access IP is hidden, but access (thus meta data) itself is not...
email  privacy  leakage  check  test  service  tracker  detection 
december 2018 by asteroza
Report: Location Data Monetization in iOS Apps (Sep 2018) - Guardian Mobile Firewall for iPhone and iPad
So there are 75 or so major location data aggregators/providers used for advertising on mobile apps and/or user linking to desktop browsers, here are some major offenders on iOS recently...
privacy  advertising  location  tracking  security 
december 2018 by asteroza
Privacy Framework | NIST
NIST working on a related analog of the Cybersecurity Framework, but for privacy
NIST  privacy  framework  risk  management  business  security 
november 2018 by asteroza
Island - Apps on Google Play
Closed source sandbox isolator using (work profiles?) and device admin privileges
android  app  software  sandboxing  privacy  security 
november 2018 by asteroza
Brass Horn Comms Onion3g
Tor embedded in a SIM card? So I guess using a private APN to funnel tor traffic to their tor relay network gateways/bridges?
Tor  union  routing  SIM  data  card  hardware  electronics  devices  security  privacy  3G 
october 2018 by asteroza
Casper Cloaking Technology - Visual Data Security - Designtex
architectural film to block LED/LCD screen output. Useful for hiding display data for displays in a meeting room with glass walls
security  privacy  film  architecture 
october 2018 by asteroza
Intra - Apps on Google Play
Google sponsored DNS-over-HTTPS DNS query funnel/VPN app
security  privacy  DoH  DNS  HTTPS  name  query  encryption  android  app  software 
october 2018 by asteroza
Dave Martorana
this does a more complete split of profiles to keep account profiles/cookie/data separate
firefox  browser  addon  plugin  extension  multiple  account  profile  privacy 
september 2018 by asteroza
Firefox Multi-Account Containers – Add-ons for Firefox
not full multi, but good enough for separating cookies and the like
firefox  browser  addon  plugin  extension  multiple  account  container  privacy 
september 2018 by asteroza
experimental anonymous comms network that is trying to be traffic analysis immune, particularly near endpoints which are under local adversarial organization control (aka corp networks)
privacy  anonymity  encryption  anonymous  communications  protocol  research  software 
august 2018 by asteroza
Trying to defeat yellow dot tracking patterns embedded in printed documents
printer  yellow  dot  antiforensic  antiforensics  privacy  anonymity  antitracking  research  software  security  tracking  forensics  printing 
july 2018 by asteroza
VPN service that supports Wireguard?
VPN  service  OpenVPN  wireguard  privacy  security  proxy  anonymous  sweden 
june 2018 by asteroza
GlassWire - Personal Firewall & Network Monitor
Sorta like LilSnitch for windows, shows when software is accessing the internet
windows  personal  firewall  network  monitor  security  privacy  snitch  networking  monitoring  tools  utilities 
june 2018 by asteroza
Wi-Fi Privacy Police - Apps on Google Play
Trying to keep the wifi stack from broadcasting known AP names, as a data leakage point
android  app  software  wifi  AP  accesspoint  name  block  security  privacy  anonymity 
june 2018 by asteroza
Detangle - Chrome Web Store
Needs an additional install from the github repo
chrome  browser  addon  plugin  extension  profile  management  security  privacy 
june 2018 by asteroza
Distributed Localization: A Linear Theory - IEEE Journals & Magazine
Using linear approximations seems to work decently to calculate location using a distributed architecture. AKA using cellphones to geolocate each other rather than triangulate strictly from basestations, and using it like a graph node network so your tracking ability can reach like a tentacle into buildings and closed spaces, assuming nobody is feeding fake info...
p2p  5G  geolocation  IoT  decentralized  positioning  location  algorithm  anchorless  dynamic  privacy  security  anonymity  mapping 
may 2018 by asteroza
IEEE SA - 7012 - Standard for Machine Readable Personal Privacy Terms
Machine readable privacy policy spec, which in some ways would be a precursor to machine readable contracts (lawyers optional?)
IEEE  machine  readable  privacy  policy  standard  specification 
may 2018 by asteroza
mindedsecurity/shhlack: Slack message encryptor/decryptor for desktop app and browser
E2E for Slack, so your boss or Slack can't decrypt private messages. Also makes e-discovery more of a pain too...
e2e  encryption  security  Slack  instant  message  IM  chat  privacy 
may 2018 by asteroza
Njalla — A privacy-aware domain registration service
Registrar that tries to hide contact info as much as possible. Shell company in Nevis, contact email is a .onion address.
anonymous  domain  name  DNS  registration  registrar  service  privacy  security 
april 2018 by asteroza
Tall Poppy
Some sort of anti-harassment service/tool set?
antiharassment  software  tools  service  defense  privacy 
april 2018 by asteroza
Android Developers Blog: DNS over TLS support in Android P Developer Preview
Boom, forcing all DNS queries to use a specific DNS provider, particularly Google's, which just so happens to do DNS-over-TLS, making DNS metadata leakage harder...
android  private  DNS  network  setting  DNS-over-TLS  privacy  metadata 
april 2018 by asteroza
Facebook Container – Add-ons for Firefox
Ha, now Mozilla gets in the act and releases a custom extension to completely contain facebook interactions. Which will only work if you first completely nuke firefox to erase all traces/cookies/ID's/ad beacons first, before reinstalling. Will probably still leak data if you use a facebook logon elsewhere though. I suppose if you want to do something and your OPSEC game isn't on, this will have to do.
firefox  addon  plugin  extension  privacy  security  isolated  tab  container  facebook 
march 2018 by asteroza
Protective iPhone Cases & Wallets with RFID blocking by Vaultskin
Vaultcard seems to be a RFID transponder based jammer to protect nearby contactless cards. They seem to suggest the jamming is commensurate to reader power (to defend against high power reader attacks), but it isn't a dumb retroreflector.
RFID  shield  defense  security  privacy 
march 2018 by asteroza
blocklists/all at master · jmdugan/blocklists
Appears to be huge anti-facebook hosts file block, covers whatsapp and instagram too?
antisocial  hosts  file  security  privacy  blocklist  block  list 
march 2018 by asteroza
Interesting browser profile splitter extension
chrome  browser  profile  container  splitter  extension  addon  plugin  security  privacy 
february 2018 by asteroza
Zcash - New Empirical Research into Zcash Privacy
TLDR; Popping Zcash into and then right back out of a shielded address still exposes you traffic analysis discovery, you big dummy
Zcash  shielded  address  discovery  traffic  analysis  data  leakage  security  privacy  anonymity 
december 2017 by asteroza
« earlier      
per page:    204080120160

related tags

0.5  2.0  2.4GHz  2ch  2chan  2G  3Dforcetouch  3G  3M  4.3  4.4  4chan  5G  8.1  0120  802.11  802.15.4a  abuse  access  accessory  accesspoint  account  accountability  Acidus  acoustic  active  activism  activist  activity  ad  adapter  adblock  adblocker  add  addon  address  adobe  Adrater  ads  adversarial  advertiser  advertising  advocacy  affiliation  agentless  aggregator  AGI  AirChat  airport  ajax  aka-aki  alert  algorithm  alias  alternative  amazon  AN.ON  analysis  analytics  anarchy  anchorless  android  announcement  anon  anonimization  anonimizer  anonym.OS  anonymity  anonymized  anonymizer  anonymizing  anonymous  anthropology  anti-face-detection  anti-OCR  anti-surveillance  antiad  antiadware  anticopyright  anticrawler  antiflash  antiforensic  antiforensics  antigoogle  antiharassment  antikeylogger  antimalware  antipaparazzi  antiRFID  antisearch  antiSEO  antiskimming  antisnoop  antisnooping  antisocial  antispam  antispider  antispyware  antisurveillance  antitracker  antitracking  antivirus  AOSP  AP  API  APK  app  apparel  apple  appleseed  appliance  application  AR  architecture  art  article  artifact  assemblage  assisted  asterisk  astoria  async  asynchronous  attack  attention  AU  audio  augementedc  authentication  automated  autonomous  aviator  back  bad  badge  bag  bait  balancer  bandaid  bandwidth  banned  based  batch  BBC  beacon  BeAware  berlinfirewall  bidirectional  bigbrother  biometrics  BIOS  bit  bitblinder  bitcoin  BITE  bittorrent  blackberry  blacklist  blackmail  blackphone  Blacksheep  block  blocker  blocking  blocklist  blog  bluetooth  body  bonjour  bossmode  botnet  bounce  BoxOfProx  bracelet  brain  breach  bridge  broken  broker  broswer  brother  browser  browser-in-browser  browsing  BSD  btguard  bug  bugging  bulb  burner  burst  business  button  bypass  C#  C++  CA  cable  cache  cage  call  callerID  camera  camoflage  camoflaged  CamoFlash  camouflage  canary  CAPTCHA  capture  card  cargo  cascade  catcher  CCleaner  CCTV  CDN  Cellebrite  cellhpone  cellphone  censorship  censorware  centric  certificate  CGI  cgiproxy  chain  chance  change  changer  channel  charmbadge  charmtag  chart  chat  Chatroulette  check  checker  checking  checkter  child  china  chip  chrome  chromium  ciphershed  circumventer  circumvention  clearinghouse  clearnet  client  clipboard  cloak  clock  clonedriving  cloning  Close&Forget  closed  clothing  cloud  cloudflare  clutch  CNN  code  COFEE  coinhive  collaboration  Collusion  colocation  combined  comet  commercial  communication  communications  comparision  comparison  compartment  compliance  compulsory  computer  computing  ComSec  comunication  concept  concurrent  conference  configuration  configurator  confirmation  connection  consolidated.db  construct  consumer  contact  container  content  context  contextual  control  controlled  conversion  converter  cookie  cookies  cool  cop  copperhead  copy  copyright  Core  corporate  corporation  correction  cortana  counter  counterforensic  counterintelligence  countermeasure  countersurveillance  countersurveillant  CPU  cracking  Craigslist  creation  credential  credentials  Credentica  credit  crowdfunding  crowdsourcing  cryptainer  CryptainerLE  crypto  cryptoAPI  Cryptocat  cryptocurrency  cryptography  cryptominer  culture  customization  CV  CVdazzle  cyberrnetics  daemon  daemons  DAM  dark  DarkMail  darknet  DART  dashboard  data  database  databases  dataglyph  datamining  dataset  dazzle  ddon  DDoS  deaddrop  deanonimization  deanonymizer  debian  decentralization  decentralized  Declaration  decode  decoding  decryption  deep  defcon  defense  delete  deletion  Delicious  delivery  demo  demonstrator  deniable  dependent  design  desktop  destination  destruct  detect  detection  development  device  devices  DHT  differential  DIFRwear  Digicash  digital  discovery  discussion  disk  display  disposable  dissent  dissident  distributed  distribution  distro  DIY  django  DLL  DNS  DNS-over-TLS  DNSSEC  docucolor  DoH  Dojo  domain  donotcall  door  dot  doubleclick  download  doxing  DPI  dragnet  drive  driver  drivers  drop  dump  Dvach  dynamic  E-ZPass  e2e  EC2  Echo  ecommerce  ecosystem  edge  editor  education  EFF  egress  ElectroBSD  electronic  electronics  email  embedded  emulation  enclave  encoding  encounter  encrypted  encryption  end2end  enforcement  enforcer  engine  engineering  enhanced  enterprise  entity  entropy  environment  ephemeral  erase  Eraser  error  essay  estimate  ethernet  ethics  EU  europe  evasion  evercookie  evesdropping  evidence  evil  excel  executive  exercise  EXIF  exit  experimental  exploit  export  extension  extensions  external  extraction  extractor  eyeglasses  eyewear  F-droid  F2F  face  facebook  facial  factor  fake  FakeAP  false  faq  faraday  fashion  fax  FEC  federated  federation  file  filesystem  filetype:pdf  film  filter  filtering  finance  FinFisher  fingerprint  fingerprinting  firefox  firesheep  firewall  firmware  flash  flexispy  flickr  FluidNexus  FOIA  folding  font  FontCode  footprint  Force-TLS  forcetouch  forensic  forensics  fork  form  forum  forward  forwarding  framework  fraud  free  FreeBSD  freedial  freedom  freemium  freenet  freenigma  freeware  friend  frontend  fuel  fun  furniture  futurism  gaim  gateway  gathering  gaze  general  generation  generator  gentoo  geoIP  geolocation  germany  ghetto  Ghostery  GIF  GIFC  glasses  gmail  GNSS  GNU  GNUnet  goggles  google  googleanon  googlemaps  government  GPG  GPS  graphic  greatfirewall  green  group  GroupVPN  GSM  guard  guardian  GUI  guide  guidelines  hack  hacking  HackingTeam  halftone  hard  hardening  hardware  hased  hash  HCI  header  health  heatmap  HID  hidden  hidetext  high  hijack  history  hitachi  hole  home  homomorphic  honest  honeypot  hook  hooking  hosted  hosting  hostproof  hosts  hotspot  HotSpotShield  house  howto  HP  HTML  HTML5  http  HttpCore  https  human  humber  humor  Hydra  hyperlocal  hypervisor  i2p  iBypass  icons  ID  ideas  idendtity  identicon  identification  identity  IE  IEEE  iframe  III  im  image  imaging  implant  implementation  IMSI  independent  individual  info  information  infoviz  infrastructure  injection  inline  input  inspection  instabird  instant  instantbird  integer  integrity  intel  interaction  intercept  interception  interface  interference  intermediary  international  internet  internet-of-things  interview  invasion  investigation  iOS  IoT  IP  IP-PBX  iPad  iphone  iPhoneTracker  IPOP  IPoP2P  IPPBX  IPredator  iptables  IPv6  IR  ISO  isolated  isolation  ISP  ITU  iventory  jabber  jailbroken  jammer  jamming  Janus  JanusPA  JanusVM  JAP  japan  java  javascript  JonDo  JonDonym  journalism  JPEG  JPG  jQuery  juggalo  KDDI  key  keyboard  keylogger  keyword  kit  knowledge  Koolspan  korea  lab  laboratory  labs  laptop  laser  law  layer  LBS  leak  leakage  learning  LED  legal  letter  letterlocking  liberty  Liberté  libpurple  library  license  lifehacks  Lifelock  limited  link  links  linux  list  little  littlebrother  littlesnitch  liveCD  LiveCD  liveDVD  load  lobbying  local  localhost  location  lock  LockNote  log  logging  login  mac  machine  MACshift  madrid  magnetic  mail  makeup  malware  management  map  mapping  mark  marker  market  marketing  marketplace  masked  masking  mastercard  materials  mDNS  measurement  media  media:document  mediated  medical  medicine  memory  message  messaging  messenger  meta  metadata  metasearch  method  mGuard  mic  michigan  microphone  microSD  microsoft  military  miniaturization  mining  Mirage  MITM  MitM  mix  mixed  mixmaster  mixminion  mixnet  mob  mobile  moblock  module  monitor  monitoring  monstor  moo  Mootolols  movie  MR  MSGTAG  mu  multiple  multiuser  mutual  mystery  name  NAT  national  native  NebuAd  needle-in-haystack  netowrk  network  networking  neuro  neuroscience  neurosecurity  nevercookie  news  Niels  NIST  no  node  node.js  notary  note  notepad  notification  NSA  NSFW  NSL  NSTIC  nTAG  number  numbers  obfuscated  obfuscation  object  obscure  obscurity  observatory  obstcp  OCR  office  offshore  OFFsystem  OMEMO  on  one  OneSwarm  onetime  onion  online  open  opencv  openID  OpenPGP  opensource  OpenVPN  openVPN  OpenWatch  opera  OperaTor  opportunistic  OPSEC  OpSec  opt-out  optout  orbot  oriented  origami  OS  OSX  otr  overlay  overview  owned  owner  ownership  p2p  package  packaged  packet  pad  pair  pairing  panic  Panopticlick  panopticon  paper  paranoia  paranoid  paranoidlinux  parental  participatory  partition  party  passing  passive  passport  password  passwords  PasteBay  pastebin  patent  path  payload  payment  PayPal  PBX  PC  PCI-DSS  PDF  peer  peerguardian  penetrating  penetration  people  performance  permission  persistence  persistent  personal  personalization  PGP  phantom  phone  Phonebook  phonecall  photo  photography  php  phpproxy  PHProxy  physical  picture  PII  pinning  Pirate  piratebay  pixel  PKI  plaintext  platform  plausibly  plugin  plus  PNG  PNGsmuggler  PoC  polarized  polarizing  polic  police  policy  politics  pond  portable  portal  positioning  postal  posting  powder  powerpoint  PpMm  PPTP  prefetch  prepaid  presence  prevention  printer  printing  privacy  private  PrivateEye  Privnote  Privoxy  probabilistic  profile  programming  project  proof-of-concept  protection  protest  protestor  protocol  prototype  provider  Provos  proxcard  proximity  proxy  proxybox  ProxyHam  proxytunnel  PRQ  pseudoanonimity  pseudoanonymity  pseudoanonymous  pseudonym  PSTN  psychology  publisher  publishing  pump  punching  purchase  pwned  python  QNAME  QRcode  Qualcomm  query  QuickSilver  radio  RAM  RAMdisk  randomizer  ranging  Rapleaf  RAR  RaspberryPi  RCS  read  readable  reader  ReadNotify  real  reality  receipient  receipt  recognition  record  recorder  recording  recovery  redaction  Reddit  redirect  redirection  RedPhone  reduction  reference  reflective  refusal  registrar  registration  registry  Relakks  relay  remailer  remailing  remodeling  remote  removal  repeater  report  repository  request  requestion  research  reset  resistant  retroreflector  return  reverse  RF  RFC6189  RFID  ricochet  riffle  rig  rights  risk  robocall  root  rootkit  router  routing  RPKI  rubberhose  rules  russia  s60  safari  safety  sandboxing  satire  scan  scanner  scanning  scarf  scatterchat  science  SCIMP  scoial  screen  screenshot  script  Scriptaculous  scroogle  scrubbing  SD  search  secdure  secrecy  secret  secure  SecureIX  security  self  self-destruct  selfdestruct  semiconductor  sender  sensor  separation  serial  server  serverless  service  services  session  setting  settings  setup  SGX  shade  shared  ShareMeNot  sharing  sheriff  shield  shielded  shockwave  shortner  shouldersurfing  sidejacking  sign  signal  signaling  signature  SIM  SIP  site  sitetruth  skew  skimmer  skimming  skyhook  skype  slack  slopsbox  small  smarphone  smart  smartphone  SMS  smuggling  SNI  sniffing  snitch  SNS  social  SocialVPN  society  sociology  sociometric  SOCKS  SOCKS4  SOCKS5  Socksify  soft  software  solid  sound  sousveilance  sousveillance  south  spam  spamtrap  specification  spectrogram  speed  splitter  spoofing  spotlight  spy  spying  spyware  SS7  ssh  SSL  SSO  stalking  standard  standards  startup  station  statistical  statistics  status  steganography  stegbreak  stenography  step  stingray  storage  streaming  strip  stripe  strong  STUN  submission  subscription  suite  sunglasses  supercookie  supply  support  suppression  SURB  sureveillance  surveillance  suspended  sweden  SWFScan  switzerland  sxip  sxipper  Symbian  sysadmin  system  systems  tab  table  tag  TagMeNot  tail  Tails  tap  targeted  targeting  tcp  techniques  technology  telemarketing  telemetry  telephone  telex  temperature  temporary  TensorFlow  test  tester  testing  text  TextSecure  texttoimage  theft  thepiratebay  threaded  threads  throwaway  thunderbird  time  timestamp  tips  TLS  toggle  token  tomography  tool  toolfree  tools  toothing  tor  Tor-ramdisk  tor2web  torrent  tower  tox  TPB  TPM  tracker  TrackerBlock  tracking  traffic  transfer  transmission  transparency  transparent  trap  travel  traveler  tricks  tripwire  trojan  trolling  truecrypt  TrueCryptNext  TrustChip  trusted  truth  tuning  tunnel  tunneling  TURN  tutorial  tweet  twitter  type  typeface  ubercookie  ublo  uBlock  Ubuntu  UDP  UFED  UID  UK  ultrasonic  UltraSurf  Ultrasurf  umber  uncensored  uninstall  union  universal  unmonitored  upload  uproxy  URL  US  USA  usage  usb  user  user-centric  username  utilites  utilities  Vanish  variance  vector  Veiled  vender  VeraCrypt  verification  Vibe  video  videoconferencing  Virgil  virtual  virtualization  VISA  vision  visit  visor  visual  visualization  VM  vmware  voice  voicemail  voip  VPN  vtunnel  vuze  wall  wallet  wallofsheep  warcloning  warning  warrant  watch  way  web  webbug  webcam  webdev  webmail  webpage  webRTC  website  WebSockets  whack-a-mole  Whispermonitor  whistleblower  whitehat  whitenoise  whspr  wifi  wiki  windows  wipe  wireguard  wireless  wiretapping  word  work  worker  writing  Xen  xerox  XMPP  XP  xray  Y.2770  Yauba  yellow  yosemite  zapper  Zcash  zensursula  zero  ZeroBin  zerocash  zerocoin  zeroknowledge  Zfone  zigbee  zip  ZKS  ZXX 

Copy this bookmark: