Adds links

This commit is contained in:
Alicia Sykes 2024-03-28 14:42:00 +00:00
parent cb1d45cab6
commit a177005f1d

View File

@ -35,8 +35,9 @@
A password manager is an application that generates, stores and auto-fills your login credentials for you. A password manager is an application that generates, stores and auto-fills your login credentials for you.
All your passwords will be encrypted against 1 master passwords (which you must remember, and it should be All your passwords will be encrypted against 1 master passwords (which you must remember, and it should be
very strong). Most password managers have browser extensions and mobile apps, so whatever device you are on, very strong). Most password managers have browser extensions and mobile apps, so whatever device you are on,
your passwords can be auto-filled. A good all-rounder is [BitWarden](https://bitwarden.com), or see your passwords can be auto-filled. A good all-rounder is
[Recommended Password Managers](https://github.com/Lissy93/awesome-privacy#password-managers) [Bitwarden](https://awesome-privacy.xyz/essentials/password-managers/bitwarden), or see
[Recommended Password Managers](https://awesome-privacy.xyz/essentials/password-managers)
- point: Avoid sharing passwords - point: Avoid sharing passwords
priority: Essential priority: Essential
@ -74,7 +75,7 @@
if you are in any of their lists. [Firefox Monitor](https://monitor.firefox.com), [Have I been pwned](https://haveibeenpwned.com) if you are in any of their lists. [Firefox Monitor](https://monitor.firefox.com), [Have I been pwned](https://haveibeenpwned.com)
and [DeHashed](https://dehashed.com) allow you to sign up for monitoring, where they will notify you if your and [DeHashed](https://dehashed.com) allow you to sign up for monitoring, where they will notify you if your
email address appears in any new data sets. It is useful to know as soon as possible when this happens, so email address appears in any new data sets. It is useful to know as soon as possible when this happens, so
that you can change your passwords for the affected accounts. Have I been pwned also has domain-wide that you can change your passwords for the affected accounts. [Have i been pwned](https://awesome-privacy.xyz/security-tools/online-tools/have-i-been-pwned) also has domain-wide
notification, where you can receive alerts if any email addresses under your entire domain appear (useful if notification, where you can receive alerts if any email addresses under your entire domain appear (useful if
you use aliases for [anonymous forwarding](https://github.com/Lissy93/awesome-privacy#anonymous-mail-forwarding)) you use aliases for [anonymous forwarding](https://github.com/Lissy93/awesome-privacy#anonymous-mail-forwarding))
@ -182,7 +183,7 @@
priority: Advanced priority: Advanced
details: >- details: >-
For increased security, an encrypted offline password manager will give you full control over your data. For increased security, an encrypted offline password manager will give you full control over your data.
[KeePass](https://keepass.info) is a popular choice, with lots of [plugins](https://keepass.info/plugins.html) and [KeePass](https://awesome-privacy.xyz/essentials/password-managers/keepass) is a popular choice, with lots of [plugins](https://[KeePass](https://awesome-privacy.xyz/essentials/password-managers/keepass).info/plugins.html) and
community forks with additional compatibility and functionality. Popular clients include: [KeePassXC](https://keepassxc.org) community forks with additional compatibility and functionality. Popular clients include: [KeePassXC](https://keepassxc.org)
(desktop), [KeePassDX](https://www.keepassdx.com) (Android) and [StrongBox](https://apps.apple.com/us/app/strongbox-password-safe/id897283731) (desktop), [KeePassDX](https://www.keepassdx.com) (Android) and [StrongBox](https://apps.apple.com/us/app/strongbox-password-safe/id897283731)
(iOS). The drawback being that it may be slightly less convenient for some, and it will be up to you to back it up, (iOS). The drawback being that it may be slightly less convenient for some, and it will be up to you to back it up,
@ -232,7 +233,8 @@
priority: Essential priority: Essential
details: >- details: >-
Using an ad-blocker can help improve your privacy, by blocking the trackers that ads implement. Using an ad-blocker can help improve your privacy, by blocking the trackers that ads implement.
[uBlock Origin](https://github.com/gorhill/uBlock) is a very efficient and open source browser addon, [uBlock Origin](https://awesome-privacy.xyz/networking/ad-blockers/ublock-origin) is a very
efficient and open source browser addon,
developed by Raymond Hill. When 3rd-party ads are displayed on a webpage, they have the ability to developed by Raymond Hill. When 3rd-party ads are displayed on a webpage, they have the ability to
track you, gathering personal information about you and your habits, which can then be sold, or used track you, gathering personal information about you and your habits, which can then be sold, or used
to show you more targeted ads, and some ads are plain malicious or fake. Blocking ads also makes pages to show you more targeted ads, and some ads are plain malicious or fake. Blocking ads also makes pages
@ -244,7 +246,8 @@
It may sound obvious, but when you logging into any online accounts, double check the URL is correct. It may sound obvious, but when you logging into any online accounts, double check the URL is correct.
Storing commonly visited sites in your bookmarks is a good way to ensure the URL is easy to find. When Storing commonly visited sites in your bookmarks is a good way to ensure the URL is easy to find. When
visiting new websites, look for common signs that it could be unsafe: Browser warnings, redirects, visiting new websites, look for common signs that it could be unsafe: Browser warnings, redirects,
on-site spam and pop-ups. You can also check a website using a tool, such as: [Virus Total URL Scanner](https://www.virustotal.com/gui/home/url), on-site spam and pop-ups. You can also check a website using a tool, such as:
[Virus Total](https://awesome-privacy.xyz/security-tools/online-tools/virus-total),
[IsLegitSite](https://www.islegitsite.com), [Google Safe Browsing Status](https://transparencyreport.google.com/safe-browsing/search) [IsLegitSite](https://www.islegitsite.com), [Google Safe Browsing Status](https://transparencyreport.google.com/safe-browsing/search)
if you are unsure. if you are unsure.
@ -263,7 +266,8 @@
- point: Use a Privacy-Respecting Browser - point: Use a Privacy-Respecting Browser
priority: Essential priority: Essential
details: >- details: >-
[Firefox](https://www.mozilla.org/en-US/firefox/new) (with a few tweaks) and [Brave](https://brave.com) [Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox) (with a few tweaks)
and [Brave](https://awesome-privacy.xyz/essentials/browsers/brave-browser)
are secure, private-respecting browsers. Both are fast, open source, user-friendly and available on all are secure, private-respecting browsers. Both are fast, open source, user-friendly and available on all
major operating systems. Your browser has access to everything that you do online, so if possible, avoid major operating systems. Your browser has access to everything that you do online, so if possible, avoid
Google Chrome, Edge and Safari as (without correct configuration) all three of them, collect usage data, Google Chrome, Edge and Safari as (without correct configuration) all three of them, collect usage data,
@ -275,8 +279,9 @@
priority: Essential priority: Essential
details: >- details: >-
Using a privacy-preserving, non-tracking search engine, will reduce risk that your search terms are not Using a privacy-preserving, non-tracking search engine, will reduce risk that your search terms are not
logged, or used against you. Consider [DuckDuckGo](https://duckduckgo.com), [Qwant](https://www.qwant.com), logged, or used against you. Consider [DuckDuckGo](https://awesome-privacy.xyz/essentials/search-engines/duckduckgo),
or [SearX](https://searx.me) (self-hosted). Google implements some [incredibly invasive](https://hackernoon.com/data-privacy-concerns-with-google-b946f2b7afea) or [Qwant](https://awesome-privacy.xyz/essentials/search-engines/qwant).
Google implements some [incredibly invasive](https://hackernoon.com/data-privacy-concerns-with-google-b946f2b7afea)
tracking policies, and have a history of displaying [biased search results](https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10). tracking policies, and have a history of displaying [biased search results](https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10).
Therefore Google, along with Bing, Baidu, Yahoo and Yandex are incompatible with anyone looking to protect Therefore Google, along with Bing, Baidu, Yahoo and Yandex are incompatible with anyone looking to protect
their privacy. It is recommended to update your [browsers default search](https://duckduckgo.com/install) their privacy. It is recommended to update your [browsers default search](https://duckduckgo.com/install)
@ -287,7 +292,7 @@
details: >- details: >-
Extensions are able to see, log or modify anything you do in the browser, and some innocent looking Extensions are able to see, log or modify anything you do in the browser, and some innocent looking
browser apps, have malicious intentions. Websites can see which extensions you have installed, and may browser apps, have malicious intentions. Websites can see which extensions you have installed, and may
use this to enhance your fingerprint, to more accurately identify/ track you. Both Firefox and Chrome use this to enhance your fingerprint, to more accurately identify/ track you. Both [Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox) and Chrome
web stores allow you to check what permissions/access rights an extension requires before you install it. web stores allow you to check what permissions/access rights an extension requires before you install it.
Check the reviews. Only install extensions you really need, and removed those which you haven't used in a while. Check the reviews. Only install extensions you really need, and removed those which you haven't used in a while.
@ -309,7 +314,7 @@
(developed by the [EFF](https://www.eff.org/)) used to be a browser extension/addon that automatically (developed by the [EFF](https://www.eff.org/)) used to be a browser extension/addon that automatically
enabled HTTPS on websites, but as of 2022 is now deprecated. In their [accouncement article](https://www.eff.org/) enabled HTTPS on websites, but as of 2022 is now deprecated. In their [accouncement article](https://www.eff.org/)
the EFF explains that most browsers now integrate such protections. Additionally, it provides instructions the EFF explains that most browsers now integrate such protections. Additionally, it provides instructions
for Firefox, Chrome, Edge and Safari browsers on how to enable their HTTPS secure protections. for [Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox), Chrome, Edge and Safari browsers on how to enable their HTTPS secure protections.
- point: Use DNS-over-HTTPS - point: Use DNS-over-HTTPS
priority: Essential priority: Essential
@ -317,17 +322,22 @@
Traditional DNS makes requests in plain text for everyone to see. It allows for eavesdropping and Traditional DNS makes requests in plain text for everyone to see. It allows for eavesdropping and
manipulation of DNS data through man-in-the-middle attacks. Whereas DNS-over-HTTPS performs DNS manipulation of DNS data through man-in-the-middle attacks. Whereas DNS-over-HTTPS performs DNS
resolution via the HTTPS protocol, meaning data between you and your DNS resolver is encrypted. resolution via the HTTPS protocol, meaning data between you and your DNS resolver is encrypted.
A popular option is Cloudflare's 1.1.1.1, or compare providers- it is simple to enable in-browser. A popular option is [CloudFlare](https://awesome-privacy.xyz/networking/dns-providers/cloudflare)'s [1.1.1.1](https://awesome-privacy.xyz/security-tools/mobile-apps/1.1.1.1), or compare providers- it is simple to enable in-browser.
Note that DoH comes with its own issues, mostly preventing web filtering. Note that DoH comes with its own issues, mostly preventing web filtering.
- point: Multi-Session Containers - point: Multi-[Session](https://awesome-privacy.xyz/communication/encrypted-messaging/session) Containers
priority: Essential priority: Essential
details: >- details: >-
Compartmentalisation is really important to keep different aspects of your browsing separate. For Compartmentalisation is really important to keep different aspects of your browsing separate. For
example, using different profiles for work, general browsing, social media, online shopping etc example, using different profiles for work, general browsing, social media, online shopping etc
will reduce the number associations that data brokers can link back to you. One option is to make will reduce the number associations that data brokers can link back to you. One option is to make
use of Firefox Containers which is designed exactly for this purpose. Alternatively, you could use of [Firefox Containers](https://awesome-privacy.xyz/security-tools/browser-extensions/firefox-multi-account-containers)
use different browsers for different tasks (Brave, Firefox, Tor etc). which is designed exactly for this purpose.
Alternatively, you could
use different browsers for different tasks
([Brave](https://awesome-privacy.xyz/essentials/browsers/brave-browser),
[Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox),
[Tor](https://awesome-privacy.xyz/networking/mix-networks/tor) etc).
- point: Use Incognito - point: Use Incognito
priority: Essential priority: Essential
@ -361,7 +371,9 @@
priority: Essential priority: Essential
details: >- details: >-
Blocking trackers will help to stop websites, advertisers, analytics and more from tracking you in Blocking trackers will help to stop websites, advertisers, analytics and more from tracking you in
the background. Privacy Badger, DuckDuckGo Privacy Essentials, uBlock Origin and uMatrix (advanced) the background. [Privacy Badger](https://awesome-privacy.xyz/security-tools/browser-extensions/privacy-badger),
[DuckDuckGo Privacy Essentials](https://awesome-privacy.xyz/security-tools/browser-extensions/privacy-essentials),
[uBlock Origin](https://awesome-privacy.xyz/networking/ad-blockers/ublock-origin) and uMatrix (advanced)
are all very effective, open source tracker-blockers available for all major browsers. are all very effective, open source tracker-blockers available for all major browsers.
- point: Beware of Redirects - point: Beware of Redirects
@ -439,7 +451,8 @@
priority: Optional priority: Optional
details: >- details: >-
The CSS Exfiltrate attack is a method where credentials and other sensitive details can be snagged with The CSS Exfiltrate attack is a method where credentials and other sensitive details can be snagged with
just pure CSS. You can stay protected, with the CSS Exfil Protection plugin. just pure CSS. You can stay protected,
with the [CSS Exfil Protection](https://awesome-privacy.xyz/security-tools/browser-extensions/css-exfil-protection) plugin.
- point: Deactivate ActiveX - point: Deactivate ActiveX
priority: Optional priority: Optional
@ -458,7 +471,8 @@
priority: Optional priority: Optional
details: >- details: >-
Canvas Fingerprinting allows websites to identify and track users very accurately. You can use the Canvas Fingerprinting allows websites to identify and track users very accurately. You can use the
Canvas-Fingerprint-Blocker extension to spoof your fingerprint or use Tor. Canvas-Fingerprint-Blocker extension to spoof your fingerprint or
use [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor).
- point: Spoof User Agent - point: Spoof User Agent
priority: Optional priority: Optional
@ -488,14 +502,16 @@
- point: Enable 1st-Party Isolation - point: Enable 1st-Party Isolation
priority: Optional priority: Optional
details: >- details: >-
First party isolation means that all identifier sources and browser state are scoped using the URL bar [First Party Isolation](https://awesome-privacy.xyz/security-tools/browser-extensions/first-party-isolation) means
that all identifier sources and browser state are scoped using the URL bar
domain, this can greatly reduce tracking. domain, this can greatly reduce tracking.
- point: Strip Tracking Params from URLs - point: Strip Tracking Params from URLs
priority: Advanced priority: Advanced
details: >- details: >-
Websites often append additional GET parameters to URLs that you click, to identify information like Websites often append additional GET parameters to URLs that you click, to identify information like
source/referrer. You can sanitize manually, or use an extension like ClearUrls to strip tracking data source/referrer. You can sanitize manually,
or use an extension like [ClearURLs](https://awesome-privacy.xyz/security-tools/browser-extensions/clearurls) to strip tracking data
from URLs automatically. from URLs automatically.
- point: First Launch Security - point: First Launch Security
@ -508,7 +524,7 @@
- point: Use The Tor Browser - point: Use The Tor Browser
priority: Advanced priority: Advanced
details: >- details: >-
The Tor Project provides a browser that encrypts and routes your traffic through multiple nodes, keeping The [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor) Project provides a browser that encrypts and routes your traffic through multiple nodes, keeping
users safe from interception and tracking. The main drawbacks are speed and user experience. users safe from interception and tracking. The main drawbacks are speed and user experience.
- point: Disable JavaScript - point: Disable JavaScript
@ -605,7 +621,9 @@
- point: Consider Switching to a Secure Mail Provider - point: Consider Switching to a Secure Mail Provider
priority: Optional priority: Optional
details: >- details: >-
Secure and reputable email providers such as Forward Email, ProtonMail, and Tutanota allow for end-to-end Secure and reputable email providers such as [Forward Email](https://awesome-privacy.xyz/communication/encrypted-email/forward-email),
[ProtonMail](https://awesome-privacy.xyz/communication/mail-forwarding/protonmail),
and [Tutanota](https://awesome-privacy.xyz/communication/encrypted-email/tuta) allow for end-to-end
encryption, full privacy as well as more security-focused features. Unlike typical email providers, your encryption, full privacy as well as more security-focused features. Unlike typical email providers, your
mailbox cannot be read by anyone but you, since all messages are encrypted. mailbox cannot be read by anyone but you, since all messages are encrypted.
@ -1100,10 +1118,10 @@
It's common to want to pump your router's range to the max, but if you reside in a smaller flat, your It's common to want to pump your router's range to the max, but if you reside in a smaller flat, your
attack surface is increased when your WiFi network can be picked up across the street. attack surface is increased when your WiFi network can be picked up across the street.
- point: Route all traffic through Tor - point: Route all traffic through [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor)
priority: Advanced priority: Advanced
details: >- details: >-
VPNs have their weaknesses. For increased security, route all your internet traffic through the Tor VPNs have their weaknesses. For increased security, route all your internet traffic through the [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor)
network. network.
- point: Disable WiFi on all Devices - point: Disable WiFi on all Devices
@ -1191,7 +1209,7 @@
- point: App Permissions - point: App Permissions
priority: Essential priority: Essential
details: >- details: >-
Dont grant apps permissions that they dont need. For Android, Bouncer is an app that allows you to grant Dont grant apps permissions that they dont need. For Android, [Bouncer](https://awesome-privacy.xyz/security-tools/mobile-apps/bouncer) is an app that allows you to grant
temporary/ 1-off permissions. temporary/ 1-off permissions.
- point: Only install Apps from official source - point: Only install Apps from official source
@ -1237,7 +1255,8 @@
- point: Monitor Trackers - point: Monitor Trackers
priority: Optional priority: Optional
details: >- details: >-
εxodus is a great service which lets you search for any app and see which trackers are embedded in it. [εxodus](https://awesome-privacy.xyz/security-tools/online-tools/εxodus) is a great service which
lets you search for any app and see which trackers are embedded in it.
- point: Use a Mobile Firewall - point: Use a Mobile Firewall
priority: Optional priority: Optional
@ -1252,12 +1271,13 @@
- point: Sandbox Mobile Apps - point: Sandbox Mobile Apps
priority: Optional priority: Optional
details: >- details: >-
Prevent permission-hungry apps from accessing your private data with Island, a sandbox environment. Prevent permission-hungry apps from accessing your private data with [Island](https://awesome-privacy.xyz/security-tools/mobile-apps/island), a sandbox environment.
- point: Tor Traffic - point: Tor Traffic
priority: Advanced priority: Advanced
details: >- details: >-
Orbot provides a system-wide Tor connection, which will help protect you from surveillance and public WiFi threats. [Orbot](https://awesome-privacy.xyz/security-tools/mobile-apps/orbot) provides
a system-wide Tor connection, which will help protect you from surveillance and public WiFi threats.
- point: Avoid Custom Virtual Keyboards - point: Avoid Custom Virtual Keyboards
priority: Optional priority: Optional
@ -1275,30 +1295,32 @@
priority: Optional priority: Optional
details: >- details: >-
SMS should not be used to receive 2FA codes or for communication, instead use an encrypted messaging app, SMS should not be used to receive 2FA codes or for communication, instead use an encrypted messaging app,
such as Signal. such as [Signal](https://awesome-privacy.xyz/communication/encrypted-messaging/signal).
- point: Keep your Number Private - point: Keep your Number Private
priority: Optional priority: Optional
details: >- details: >-
MySudo allows you to create and use virtual phone numbers for different people or groups. This is great for [MySudo](https://awesome-privacy.xyz/finance/virtual-credit-cards/mysudo) allows
you to create and use virtual phone numbers for different people or groups. This is great for
compartmentalisation. compartmentalisation.
- point: Watch out for Stalkerware - point: Watch out for Stalkerware
priority: Optional priority: Optional
details: >- details: >-
Stalkerware is malware that is installed directly onto your device by someone you know. The best way to get Stalkerware is malware that is installed directly onto your device by someone you know.
rid of it is through a factory reset. The best way to get rid of it is through a factory reset.
- point: Favor the Browser, over Dedicated App - point: Favor the Browser, over Dedicated App
priority: Optional priority: Optional
details: >- details: >-
Where possible, consider using a secure browser to access sites, rather than installing dedicated applications. Where possible, consider using a secure browser to access sites,
rather than installing dedicated applications.
- point: Consider running a custom ROM (Android) - point: Consider running a custom ROM (Android)
priority: Advanced priority: Advanced
details: >- details: >-
If you're concerned about your device manufacturer collecting too much personal information, consider a If you're concerned about your device manufacturer collecting too much
privacy-focused custom ROM. personal information, consider a privacy-focused custom ROM.
color: fuchsia color: fuchsia
softwareLinks: softwareLinks:
- title: Mobile Apps, for Security + Privacy - title: Mobile Apps, for Security + Privacy
@ -1334,7 +1356,8 @@
priority: Essential priority: Essential
details: >- details: >-
Maintaining encrypted backups prevents loss due to ransomware, theft, or damage. Consider using Maintaining encrypted backups prevents loss due to ransomware, theft, or damage. Consider using
Cryptomator for cloud files or VeraCrypt for USB drives. [Cryptomator](https://awesome-privacy.xyz/security-tools/mobile-apps/cryptomator)
for cloud files or [VeraCrypt](https://awesome-privacy.xyz/essentials/file-encryption/veracrypt) for USB drives.
- point: Be Careful Plugging USB Devices into your Computer - point: Be Careful Plugging USB Devices into your Computer
priority: Essential priority: Essential
@ -1460,7 +1483,7 @@
priority: Advanced priority: Advanced
details: >- details: >-
Regularly check for rootkits to detect and mitigate full system control threats using tools like Regularly check for rootkits to detect and mitigate full system control threats using tools like
chkrootkit. [chkrootkit](https://awesome-privacy.xyz/operating-systems/linux-defenses/chkrootkit).
- point: BIOS Boot Password - point: BIOS Boot Password
priority: Advanced priority: Advanced
@ -1471,7 +1494,9 @@
- point: Use a Security-Focused Operating System - point: Use a Security-Focused Operating System
priority: Advanced priority: Advanced
details: >- details: >-
Consider switching to Linux or a security-focused distro like QubeOS or Tails for enhanced privacy and Consider switching to Linux or a security-focused distro like QubeOS or
[Tails](https://awesome-privacy.xyz/operating-systems/desktop-operating-systems/tails)
for enhanced privacy and
security. security.
- point: Make Use of VMs - point: Make Use of VMs
@ -1614,7 +1639,9 @@
- point: Mitigate Alexa/ Google Home Risks - point: Mitigate Alexa/ Google Home Risks
priority: Optional priority: Optional
details: >- details: >-
Consider privacy-focused alternatives like Mycroft or use Project Alias to prevent idle listening by voice-activated assistants. Consider privacy-focused alternatives like
[Mycroft](https://awesome-privacy.xyz/smart-home-and-iot/voice-assistants/mycroft) or use
Project Alias to prevent idle listening by voice-activated assistants.
- point: Monitor your home network closely - point: Monitor your home network closely
priority: Optional priority: Optional
@ -1669,27 +1696,35 @@
- point: Use Virtual Cards - point: Use Virtual Cards
priority: Optional priority: Optional
details: >- details: >-
Utilize virtual card numbers for online transactions to protect your real banking details. Services like Privacy.com and MySudo offer such features. Utilize virtual card numbers for online transactions to protect your real banking details. Services like [Privacy.com](https://awesome-privacy.xyz/finance/virtual-credit-cards/privacy.com) and [MySudo](https://awesome-privacy.xyz/finance/virtual-credit-cards/mysudo) offer such features.
- point: Use Cash for Local Transactions - point: Use Cash for Local Transactions
priority: Optional priority: Optional
details: >- details: >-
Pay with cash for local and everyday purchases to avoid financial profiling by institutions. Pay with [Cash](https://awesome-privacy.xyz/finance/other-payment-methods/cash) for local and everyday purchases to avoid financial profiling by institutions.
- point: Use Cryptocurrency for Online Transactions - point: Use Cryptocurrency for Online Transactions
priority: Optional priority: Optional
details: >- details: >-
Opt for privacy-focused cryptocurrencies like Monero for online transactions to maintain anonymity. Use cryptocurrencies wisely to ensure privacy. Opt for privacy-focused cryptocurrencies like
[Monero](https://awesome-privacy.xyz/finance/cryptocurrencies/monero) for
online transactions to maintain anonymity. Use cryptocurrencies wisely to ensure privacy.
- point: Store Crypto Securely - point: Store Crypto Securely
priority: Advanced priority: Advanced
details: >- details: >-
Securely store cryptocurrencies using offline wallet generation, hardware wallets like Trezor or ColdCard, or consider long-term storage solutions like CryptoSteel. Securely store cryptocurrencies using offline wallet generation, hardware wallets
like [Trezor](https://awesome-privacy.xyz/finance/crypto-wallets/trezor) or
[ColdCard](https://awesome-privacy.xyz/finance/crypto-wallets/coldcard), or
consider long-term storage solutions like
[CryptoSteel](https://awesome-privacy.xyz/finance/crypto-wallets/cryptosteel).
- point: Buy Crypto Anonymously - point: Buy Crypto Anonymously
priority: Advanced priority: Advanced
details: >- details: >-
Purchase cryptocurrencies without linking to your identity through services like LocalBitcoins, Bisq, or Bitcoin ATMs. Purchase cryptocurrencies without linking to your identity through services
like [LocalBitcoins](https://awesome-privacy.xyz/finance/crypto-exchanges/localbitcoins),
[Bisq](https://awesome-privacy.xyz/finance/crypto-exchanges/bisq), or Bitcoin ATMs.
- point: Tumble/ Mix Coins - point: Tumble/ Mix Coins
priority: Advanced priority: Advanced
@ -1768,7 +1803,8 @@
- point: Install Reputable Software from Trusted Sources - point: Install Reputable Software from Trusted Sources
priority: Essential priority: Essential
details: >- details: >-
Only download software from legitimate sources and check files with tools like Virus Total before installation. Only download software from legitimate sources and check files with tools
like [Virus Total](https://awesome-privacy.xyz/security-tools/online-tools/virus-total) before installation.
- point: Store personal data securely - point: Store personal data securely
priority: Essential priority: Essential
@ -1865,19 +1901,26 @@
checklist: checklist:
- point: Destroy Sensitive Documents - point: Destroy Sensitive Documents
priority: Essential priority: Essential
details: Shred or redact sensitive documents before disposal to protect against identity theft and maintain confidentiality. details: |
Shred or redact sensitive documents before disposal to protect against
identity theft and maintain confidentiality.
- point: Opt-Out of Public Records - point: Opt-Out of Public Records
priority: Essential priority: Essential
details: Contact people search websites to opt-out from listings that show personal information, using guides like Michael Bazzell's Personal Data Removal Workbook. details: |
Contact people search websites to opt-out from listings that show persona
information, using guides like Michael Bazzell's Personal Data Removal Workbook.
- point: Watermark Documents - point: Watermark Documents
priority: Essential priority: Essential
details: Add a watermark with the recipient's name and date to digital copies of personal documents to trace the source of a breach. details: |
Add a watermark with the recipient's name and date to digital copies of
personal documents to trace the source of a breach.
- point: Don't Reveal Info on Inbound Calls - point: Don't Reveal Info on Inbound Calls
priority: Essential priority: Essential
details: Only share personal data on calls you initiate and verify the recipient's phone number. details: |
Only share personal data on calls you initiate and verify the recipient's phone number.
- point: Stay Alert - point: Stay Alert
priority: Essential priority: Essential