List of privacy tools
As efforts on decentralization, privacy and zero-knowledge cryptography constantly develop, we should not see privacy and distribution as a goal in a distant future. LunarDAO aims to see what tools and possibilities are there here and now. As a community of Lunarpunks we have the ability to compile a solid pool of resources, links, manuals which constantly evolves. It is import for everyone to make their own evaluation of these projects privacy standard and make an informed decision what to use based on that.
Online video sharing platforms
A private YouTube client.
Invidious is an open-source alternative to YouTube and is intended as a privacy alternative to the official YouTube website.
The calls can be with out without video, there is a texting function that can be used during the call, the chat room have a generated name and can also be used with a password.
For all the private messaging options it is necessary to use an application to hide your IP address, such as ProtonVPN, RiseupVPN or TOR. If used on phone - do not use a sim-card and set up an automatic reset of the mac address on every re-connection.
Ircd is a fully anonymous peer-to-peer communication tool developed by DarkFi which can be used encrypted or unencrypted, supports DM and group chats. Works with clients like Weechat directly in terminal. No need to create an account, no captchas, no bloated app with extra empty screen space. Fully distributed, runs on tor.
Session is an open source messenger that supports private and anonymous communications; DM, group chats, and voice calls.
Documentation and Whitepaper.
Signal is a free, end-to-end private messenger for DM, group chats and calls. At present, to set up Signal you need a phone number.
Molly is an independent Signal fork for Android. Molly is compatible with Signal user but also has a few more unique features, including SOCKS proxy and Tor support.
End-to-end encrypted messenger for DM and group chats, and video. Bridges to other chat app, even commercial/centralized an not private ones, such as Whatsapp and Telegram.
XMPP with Jabber or Pidgin
XMPP is a set of open technologies for instant messaging, group chat, voice and video calls. It is decentralized and open source.
End-to-end encrypted messaging for chat, audio and video with no identifiers assigned to the users.
Is an end-to end encrypted messenger for phone and desktop. User don't have to provide a phone number. Costs $6.
End-to-end encrypted messaging with the possibility to create multiple numbers, group chats, disappearing messages and soon also ability to create virtual cards. Available in US.
Offers phone number aliases. The user can create multiple phone numbers.
An important note is to use Tor browser or VPN (ideally with a browser which is focused on privacy such as Librewolf) when setting up the number, managing wallet and making transactions. Check Anonymizing assets for the payment. For jmp.chat use Sideshift to exchange to BTC.
Provides a phone number, from US, which can be used for other apps. In Privacy setup you can go through the steps needed to set it up. Is payed with BTC.
Functions like mdbook. The user can create their own wiki and to-do lists in markdown. Also check out how to build an mdbook which can be used locally for own usage only, if that is the rquirement.
Virtual machines and Tails
Tails is a portable operating system which protects against surveillance. The entire OS is on a USB without accessing or storing data in the computer (only using RAM). No metadata stored after shut down. MAc adress spoofing and tor network to connect to internet by default. Data on USB encrypted. Based on a minimalistic version of Debian - Gnome. GPG encryption, email client, onion file share, pidgin, wiping option, keepass, metadata cleaner etc by default. Tails has a function which shuts down the computer immediatly after USB removal.
Whonix is a virtual machine that runs like a process (an app) inside the OS, to help user stay anonymous on internet by for example randomizing IP address and using TOR. When shut down, no data is stored.
Works on a model of secure compartmentalization through virtualization, isolating both hardware and virtual machines (qubes) from each other. Creating not only a technical solution under the assumption that a user will suffer exploits, but also a mindset and praxis how to protect the user and limit the damage when events such as opening malicious links or files happen, by doing so in a disposable virtual machine.
Email and file encryption
OpenPGP is end-to-end encryption protocol used for email communication.
File encryption to single or multiple recipients. Run in terminal.
These email providers are without cost and end-to-end encrypted. For Riseup and Systemli an invite code is required to be able to create a new email.
Is an end-to-end encrypted mail (between Tutanota email addresses). Tutanota also encrypts the entire mailbox and also offer encrypted address book and calendar. It is not possible to set up an account with Tor browser, but it is possible to use a more private browser alternative such as Librewolf together with VPN. After registration it takes 48h before activated as the address need to be approved.
Is an end-to-end encrypted email service between protonmail accounts. It is possible to set up a free email, and the user have access directly.
SimpleLogin provides email aliases so the user don't have to give their real email address. The email sent to the alias address will arrive to the real one.
OpenPGP is used for authenticating or encrypting data, using public key cryptography.
OpenKeychain stores and manages your keys, and those of the people you communicate with, on your Android smartphone.
Is a password manager. Using industry standard database encryption 256-bit AES.
- FreeOTP Authenticator
Generates a one-time passwords on your mobile devices which can be used in conjunction with the regular password to make your login nearly impossible to hack.
VeraCrypt is a free open source disk encryption software for creating encrypted storage; hidden or visible partitions or devices.
LUKS is a feature in linux distributions as well as on Tails. It is used for encryption of particitions, such as USB or disk.
VPN and Onion routing
VPN just like Tor protects your IP address. You can read more about the difference between Tor and VPN here.
Free option. The other options can be payed in cash or with Bitcoin.
Can be payed in cash and Monero. No free option.
A private browser which hides your IP address. The project is using onion routing; relays which are run by volonteers. The browser stores no data and also block trackers.
A private browser (onion routing) that hides your IP address. It is decentralized and run on nodes in Oxen network. More info about how it works and differences with other options in their faq.
No logs, no user data stored. Protecting IP address from exposure.
Is a custom version of Firefox which is privacy oriented. It includes search providers like Duck duck go, uBlock content blocker, no telemetry (automatic recording and transmission of data for monitoring and analysis).
Private network layer
Is an encrypted private network layer. The traffic inside I2P does not interact with the internet directly, it is a layer on top of the Internet. I2P protects activity, no one can see the origin, destination, or contents of the data. It is a peer-to-peer network and if the user wants to protect their IP address they also need to use a VPN while using I2P.
MAC address randomization
Wi-Fi, Bluetooth, and Ethernet connections all use MAC addresses (Media Access Control Address). MAC addresses are always a 12 digit hexadecimal number, with the numbers separated every two digits by a colon or hyphen. MAC addresses are used to identify which device is which on users local network. Because they’re unique, MAC addresses can be used to track a user. When walking around, a smartphone scans for nearby Wi-Fi networks and broadcasts its MAC address. For better privacy it is good to learn how to change the MAC address. Here are three pages which addresses this issue:
Read more under 'Secure android phone'.
A guide on how to install macchanger on Debian based OS and how to change the mac address manually (the random changes during testing didn't work so far, but doing it manually works well).
IMEI stands for International Mobile Equipment Identity. It is a unique numeric identifier of GSM, or 3GPP and iDEN mobile phones, as well as some satellite phones.
IMEI randomization: Nokia "Banana" phone (Nokia 8110) has different ways to be hacked for IMEI randomization. The most simple way is to install Wallace Toolbox.
Installing Gerda OS on Nokia 8110 for improved usability.
- Silent link
An eSIM that can be acquired with crypto such as Monero. No phone number, data only.
Digital photo metadata removal
With this app you can blur faces and remove metadata.
To use Scrambled Exif, you don't need to open the application. Instead, go directly to the Gallery, select the picture you want to share --> click on the share icon --> select Scrambled Exif --> choose the app you want to use to send the picture --> choose contact and send --> Done.
File sharing tools
With Onionshare the user can anonymously share files, host websites, and chat with friends using the Tor network.
Private file sharing, easy to use drag-and-drop.
Shred files on linux
The shred command helps to overwrite the data of a file or disk several times. This makes it harder for third party software and hardware probing to recover the data, which is supporting users privacy.
Free software to free cache, delete cookies, clear Internet history, shred temporary files and delete logs.
Public wifi networks
A non-commercial initiative for free wireless networks.
A free wifi search tool. Enter city and receive all free wifi options in ths city.
Whoogle for example Whoogle instance via Seth for privacy.
Search engine without tracking and search history. Can be used with Anonymous view, which protects your IP address.
Duck duck go
No tracking, no ads and no storing of personal information.
Blocks trackers and ads. Include VPN.
Nextcloud is a collaboration platform where it is possible to co-edit document, share files, chat, make video calls, manage mail and share calendar. For additional privacy the team can encrypt the files that they want to share with each other on Nextcloud.
Is a tool for co-editing documents (also possible to do in markdown) and provide a storage space.
Freenet supports file sharing, browsing and publishing of so called "freesites" (web sites accessible only through Freenet). It can be used in "darknet" mode, which means that user only connect to their friends. This makes it more difficult for third party to detect.
For android phones.
These two applications are very useful as they are offline maps. They also contain ads and asks for some permissions that are not needed for functionality. Check Privacy setup for more information.
Virtual payment cards
Is a virtual Visa card, which can be used in stores and on sites that accept Visa for payments. It is possible to deposit with for example BTC and ETH, one time or reloadable card.
To be anonymous when depositing money to the card, see steps on how to anonymize ETH in Anonymizing assets. Use Sideshift to swap from ETH to BTC, or explore Panther protocol for anonymizing USDC. No KYC.