Adds the Defensive Computing List, by Michael Horowitz

This commit is contained in:
Alicia Sykes 2022-05-31 00:03:54 +01:00
parent 83ab32e63a
commit b4ee2f801c

View File

@ -568,7 +568,8 @@ This section has moved to [here](/6_Privacy_and-Security_Gadgets.md). Products,
- **Global**: [first.org](https://www.first.org) - The global Forum of Incident Response and Security Teams - **Global**: [first.org](https://www.first.org) - The global Forum of Incident Response and Security Teams
## Mega Guides ## Mega Guides
- Trusted software reccomendations and avice for privacy: [privacytools.io](https://www.privacytools.io/) - Very thorough list of things to be aware of and defensive steps, by Michael Horowitz: [defensivecomputingchecklist.com](https://defensivecomputingchecklist.com/)
- Software reccomendations and advice for privacy: [privacytools.io](https://www.privacytools.io/)
- Tips and tricks, for internet freedom, data health and privacy: [datadetoxkit.org](https://datadetoxkit.org/) - Tips and tricks, for internet freedom, data health and privacy: [datadetoxkit.org](https://datadetoxkit.org/)
- Digital security tools and tactics: [securityinabox.org](https://securityinabox.org/) - Digital security tools and tactics: [securityinabox.org](https://securityinabox.org/)
- Online privacy guide, and software reccomendations: via [Fried](https://fried.com/privacy) - Online privacy guide, and software reccomendations: via [Fried](https://fried.com/privacy)