This commit is contained in:
Alicia Sykes 2020-02-20 16:58:29 +00:00 committed by GitHub
parent f1ce3d7842
commit 10d86e11fe
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -29,8 +29,8 @@ corporations, governments, and hackers from logging, storing or selling your per
- [File Encryption](#file-encryption) - [File Encryption](#file-encryption)
- [Encrypted Messaging](#encrypted-messaging) - [Encrypted Messaging](#encrypted-messaging)
- [Encrypted Email](#encrypted-email) - [Encrypted Email](#encrypted-email)
- [Browsers](#browsers) - [Private Browsers](#browsers)
- [Search Engines](#search-engines) - [Non-Tracking Search Engines](#search-engines)
**Security** **Security**
- [Browser Extensions](#browser-extensions) - [Browser Extensions](#browser-extensions)
@ -52,12 +52,14 @@ corporations, governments, and hackers from logging, storing or selling your per
- [Backup and Sync](#backup-and-sync) - [Backup and Sync](#backup-and-sync)
- [File Drop](#file-drop) - [File Drop](#file-drop)
**Misc** **Social**
- [Social Networks](#social-networks) - [Social Networks](#social-networks)
- [Video Platforms](#video-platforms) - [Video Platforms](#video-platforms)
- [Blogging Platforms](#blogging-platforms) - [Blogging Platforms](#blogging-platforms)
**Misc**
- [Payment Methods](#payment-methods) - [Payment Methods](#payment-methods)
- [Operating Systems](#operating-systems) - [PC Operating Systems](#operating-systems)
- [Mobile Operating Systems](#mobile-operating-systems) - [Mobile Operating Systems](#mobile-operating-systems)
- [Home Automation](#home-automation) - [Home Automation](#home-automation)
- [Voice Assistants](#ai-voice-assistants) - [Voice Assistants](#ai-voice-assistants)
@ -215,7 +217,9 @@ The following browser add-ons give you better control over what content is able
#### Other Notable Mentions #### Other Notable Mentions
For more open source security & privacy apps, check out [The Guardian Project], [The Tor Project], [Oasis Feng] and [Marcel Bokhorst]- all of which are trusted developers or organisations, who've done amazing work. For more open source security & privacy apps, check out [The Guardian Project], [The Tor Project], [Oasis Feng] and [Marcel Bokhorst]- all of which are trusted developers or organisations, who've done amazing work.
For *advanced* users, the following tools can be used to closely monitor your devise and networks, in order to detect any unusual activity. [PortDroid] for network analysis, [Packet Capture] to monitor network traffic, [SysLog] for viewing system logs, [Dexplorer] to read .dex or .apk files for your installed apps, and [Check and Test] to check status and details of devices hardware For *advanced* users, the following tools can be used to closely monitor your devise and networks, in order to detect any unusual activity. [PortDroid] for network analysis, [Packet Capture] to monitor network traffic, [SysLog] for viewing system logs, [Dexplorer] to read .dex or .apk files for your installed apps, and [Check and Test] to check status and details of devices hardware.
For offensive and defensive security applications, see [The Nethunter Catalogue](https://store.nethunter.com/en/packages)
## Online Tools ## Online Tools
@ -615,18 +619,20 @@ If you are building your own assistant, you may want to consider a hardware-swit
--- ---
**Note**: In order to stay protected, it is important to also: Use strong and unique passwords, 2-factor authentication, ## Conclusion
adopt good networking practices and be mindful of data that is collected when browsing the web. See the full Many coporations that put profit before people, collecting data and exploiting privacy, many claim to to secure but without being open source it can't be verified, and it is always too late once there has been a breach. Switching to privacy-respecting, open souece software will drastically help inmprove your security, privacy and anonimity online.
**[personal security checklist](https://github.com/Lissy93/personal-security-checklist/blob/master/README.md)** for all the details 🔐
*Contributions are welcome, and appreciated - to propose an edit [open an issue](https://github.com/Lissy93/personal-security-checklist/issues/new/choose), However, that's not all you need to do- it is important to also: Use strong and unique passwords, 2-factor authentication,
or [open a PR](https://github.com/Lissy93/personal-security-checklist/pull/new/master). adopt good networking practices and be mindful of data that is collected when browsing the web. You can see the full
**[personal security checklist](https://github.com/Lissy93/personal-security-checklist/blob/master/README.md)** for more tips to staying safe 🔐
Thank you for taking the time to read the list, I hope it has been usful. If you have suggestions, then you [open an issue](https://github.com/Lissy93/personal-security-checklist/issues/new/choose), or [submit a PR](https://github.com/Lissy93/personal-security-checklist/pull/new/master). Contributions are welcome, and appreciated :)
See: [`CONTRIBUTING.md`](/.github/CONTRIBUTING.md).* See: [`CONTRIBUTING.md`](/.github/CONTRIBUTING.md).*
*Licensed under [Creative Commons, CC BY 4.0](https://creativecommons.org/licenses/by/4.0/),© [Alicia Sykes](https://aliciasykes.com) 2020*
[![Attribution 4.0 International](https://licensebuttons.net/l/by/3.0/88x31.png)](https://github.com/Lissy93/personal-security-checklist/blob/master/LICENSE.md) [![Attribution 4.0 International](https://licensebuttons.net/l/by/3.0/88x31.png)](https://github.com/Lissy93/personal-security-checklist/blob/master/LICENSE.md)
*Licensed under [Creative Commons, CC BY 4.0](https://creativecommons.org/licenses/by/4.0/), © [Alicia Sykes](https://aliciasykes.com) 2020*
<a href="https://twitter.com/intent/follow?screen_name=Lissy_Sykes"> <a href="https://twitter.com/intent/follow?screen_name=Lissy_Sykes">
<img src="https://img.shields.io/twitter/follow/Lissy_Sykes?style=social&logo=twitter" alt="Follow Alicia Sykes on Twitter"> <img src="https://img.shields.io/twitter/follow/Lissy_Sykes?style=social&logo=twitter" alt="Follow Alicia Sykes on Twitter">