# Awesome Privacy & Securty [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re) [![PRs Welcome](https://img.shields.io/badge/PRs-welcome-brightgreen.svg?style=flat-square)](http://makeapullrequest.com) [![License](https://img.shields.io/badge/LICENSE-CC_BY_4.0-00a2ff?&style=flat-square)](https://creativecommons.org/licenses/by/4.0/) [![Contributors](https://img.shields.io/github/contributors/lissy93/personal-security-checklist?color=%23ffa900&style=flat-square)](https://github.com/Lissy93/personal-security-checklist/graphs/contributors) > A curated list of useful tools and resources online, that help protect your privacy and keep you safe. **See also**: [Personal Security Checklist](https://github.com/Lissy93/personal-security-checklist/blob/master/README.md) | [Privacy-Respecting Software](https://github.com/Lissy93/personal-security-checklist/blob/master/5_Privacy_Respecting_Software.md) 🔐 - **Information and Guides** - [Getting Started Guides](#getting-started-guides) - [Specific How-To Guides](#how-to-guides) - [Notable Articles](#notable-articles) - [Blogs](#blogs) - **Media** - [Books](#books) - [Podcasts](#podcasts) - [Videos](#videos) - **Websites & Services** - [Online Tools](#online-tools) - [Anonymous Services](#anonymous-services) - [Interesting Websites](#interesting-websites) - [Privacy-Respecting Software](#privacy-respecting-software) - **Organisations** - [Foundations](#foundations) - [Government Organisations](#government-organisations) - **Research** - [Data and API's](#data-and-apis) - [Academic Journals](#academic-journals) - [Implementations and Standards](#implementations-and-standards) - **More Lists** - [Mega Guides](#mega-guides) - [Other GitHub Security Lists](#unrelated-awesome-lists) ## Getting Started Guides - [EFF SSD](https://ssd.eff.org) - Tips for safer online communications - [PrivacyTools.io]( https://www.privacytools.io) - Tools to protect against mass surveillance - [PrismBreak](https://prism-break.org/en/all) - Secure app alternatives - [The VERGE guide to privacy](https://bit.ly/2ptl4Wm) - Guides for securing mobile, web and home tech - [Email Self-Defense](https://emailselfdefense.fsf.org) - Complete guide to secure email - [Security Planner](https://securityplanner.org) - Great advise for beginners - [My Shaddow](https://myshadow.org) - Resources and guides, to help you take controll of your data - [TwoFactorAuth.org](https://twofactorauth.org) - A direcory of websites, apps and services supporting 2FA - [Just Delete Me](https://justdeleteme.xyz) - A directory of direct links to delete your account from web services ## How-To Guides - **Threat Protection** - Protect against SIM-swap scam: via [wired](https://www.wired.com/story/sim-swap-attack-defend-phone) - How to spot a phishing attack: via [EFF](https://ssd.eff.org/en/module/how-avoid-phishing-attacks) - Protection from Identity Theft: via [Restore Privacy](https://restoreprivacy.com/identity-theft-fraud) - **Netowkring** - How to enable DNS over HTTPS: via [geekwire](https://geekwire.co.uk/privacy-and-security-focused-dns-resolver) - How to resolve DNS leak issue: via [DNSLeakTest](https://www.dnsleaktest.com/how-to-fix-a-dns-leak.html) - Protect against WebRTC Leaks: via [Restore Privacy](https://restoreprivacy.com/webrtc-leaks) - ISP and DNS privacy tips: via [bluz71](https://bluz71.github.io/2018/06/20/digital-privacy-tips.html) - Complete guide to configureing Firefox for Privacy + Speed: via [12bytes](https://12bytes.org/7750) - Beginners guide on getting started with Tor: via [ProPrivacy](https://proprivacy.com/privacy-service/guides/ultimate-tor-browser-guide) - Beginners guide to I2P: via [The Tin Hat](https://thetinhat.com/tutorials/darknets/i2p.html) - How to Use a VPN and Tor together: via [ProPrivacy](https://proprivacy.com/vpn/guides/using-vpn-tor-together) - **Communication** - Configure your email client securly, from scratch - via [FSF](https://emailselfdefense.fsf.org) - Overview of projects working on next-generation secure email: via [OpenTechFund](https://github.com/OpenTechFund/secure-email) - **Devices** - Layers of Personal Tech Security: via [The Wire Cutter](https://thewirecutter.com/blog/internet-security-layers) - Improving security on iPhone: via [lifehacker](https://lifehacker.com/the-privacy-enthusiasts-guide-to-using-an-iphone-1792386831) - **Software** - How to use Vera Crypt: via [howtogeek](https://www.howtogeek.com/108501/the-how-to-geek-guide-to-getting-started-with-truecrypt) ## Notable Articles - Windows data sending: via [The Hacker News](https://thehackernews.com/2016/02/microsoft-windows10-privacy.html) - Is your Anti-Virus spying on you: via [Restore Privacy](https://restoreprivacy.com/antivirus-privacy) - Turns Out Police Stingray Spy Tools Can Indeed Record Calls: via [Wired](https://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm) - UK Police Accessing Private Phone Data Without Warrant: via [Restore Privacy](https://restoreprivacy.com/uk-police-accessing-phone-data) ## Blogs - [Spread Privacy](https://spreadprivacy.com) - Raising the standard of trust online, by DuckDuckGo - [Restore Privacy](https://restoreprivacy.com) - Tools and guides about privacy and security - [That One Privacy Site](https://thatoneprivacysite.net) - impartial comparisons and discussions - [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) - Privacy and security videos - [12Bytes](https://12bytes.org/articles/tech) - Opinion Articles about Tech, Privacy and more - [BringBackPrivacy](https://bringingprivacyback.com) - Easy-reading, sharable privacy articles - [Heimdal](https://heimdalsecurity.com/blog) - Cyber Security Blog - [Tech Crunch](https://techcrunch.com/tag/cybersecurity-101) - Cyber Security 101 - [OONI](https://ooni.org/post), Internet freedom and analysis on blocked sites - [Pixel Privacy](https://pixelprivacy.com/resources) - Online privacy guides - [The Privacy Project](https://www.nytimes.com/interactive/2019/opinion/internet-privacy-project.html) - Articles and reporting on Privacy, by the NYT - [The Tin Hat](https://thetinhat.com) - Tutorials and Articles for Online Privacy - [FOSS Bytes- Cyber Security](https://fossbytes.com/category/security) - News about the latest exploits and hacks ## Books - [Permanent Record](https://amzn.to/30wxxXi) (by Edward Snowden) - [Sandworm](https://amzn.to/2FVByeJ) (by Andy Greenberg) ## Podcasts - [Darknet Diaries] (by Jack Rhysider): Stories from the dark sides of the internet. Listen on [Stitcher][da-stitch] - [CYBER] (by Motherboard, Vice): News and analysis about the latest cyber threats. Listen on [Stitcher][cy-stitch] [Darknet Diaries]: https://darknetdiaries.com [da-stitch]: https://www.stitcher.com/podcast/darknet-diaries [CYBER]: https://www.vice.com/en_us/article/59vpnx/introducing-cyber-a-hacking-podcast-by-motherboard [cy-stitch]: https://www.stitcher.com/podcast/vice-2/cyber ## Videos - **General** - [You are being watched](https://youtu.be/c8jDsg-M6qM) by The New York Times - [The Power of Privacy](https://youtu.be/KGX-c5BJNFk) by The Guardian - [Why Privacy matters, even if you have nothing to hide](https://youtu.be/Hjspu7QV7O0) by The Hated One - **TED Talks** - [How Online Trackers Track You, and What To Do About It](https://youtu.be/jVeqAemtC6w) by Luke Crouch - [Why you should switch off your home WiFi](https://youtu.be/2GpNhYy2l08) by Bram Bonné - [Why Privacy Matters](https://www.ted.com/talks/glenn_greenwald_why_privacy_matters), by Glenn Greenwald - [Fighting viruses, defending the net](https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net), by Mikko Hypponen - [The 1s and 0s behind cyber warfare](https://www.ted.com/talks/chris_domas_the_1s_and_0s_behind_cyber_warfare), by Chris Domas - [State Sanctioned Hacking - The Elephant in the Room](https://youtu.be/z-A2MxHmnU4) - Historic, economic and demographic overview of the growing threat to the U.S. from Chinese cyber invasions, by Frank Heidt - [How the IoT is Making Cybercrime Investigation Easier](https://youtu.be/9CemONO6vrY) - How our data is changing the nature of "evidence" in digital forensics, by Jonathan Rajewski - [Online Privacy Doesn't Exist](https://youtu.be/LgWrD3EJ1Do) - The unexpected dangers our digital breadcrumbs can lead to, by Denelle Dixon - [Data is the new gold, who are the new thieves?](https://youtu.be/XNF-rGiGb50) - Introduction and demonstration of the power of data, by Tijmen Schep - **Conferences** - [DEF CON 27](https://www.youtube.com/playlist?list=PL9fPq3eQfaaA4qJEQQyXDYtTIfxCNA0wB) - Collection of talks from DEF CON 2019, Vegas - [RSA Conference](https://www.youtube.com/user/RSAConference) - Collection of security talks from the RSA conferences - [Administraitor.video](https://administraitor.video) - A regularly updated collection of new and interesting security confrence talks - **Misc** - [Through a PRISM, Darkly](https://youtu.be/e4woRYs0mM4) - Everything we know about NSA spying, by Kurt Opsahl See also: [awesome-sec-talks](https://github.com/PaulSec/awesome-sec-talks) by @PaulSec ## Online Tools - [Have I been Pwned](https://haveibeenpwned.com) and [Dehashed](https://www.dehashed.com) - Check if your details have been compromised - [Redirect Detective](https://redirectdetective.com) - Check where a suspicious URL redirects to - [εxodus](https://reports.exodus-privacy.eu.org) - Check which trackers any app on the Play Store has - [VirusTotal](https://www.virustotal.com) - Analyse a suspicious web resource for malware - [ScamAdviser](https://www.scamadviser.com) - Check if a website is a scam, before buying from it - [Deseat Me](https://www.deseat.me) - Clean up your online presence - [33Mail](http://33mail.com/Dg0gkEA) or [Anonaddy](https://anonaddy.com) Avoid revealing your real email address, by auto-generating aliases for each accound - [Panopticlick](https://panopticlick.eff.org) - Check if, and how your browser is tracking you - [Disroot](https://disroot.org) - A suit of online tools, with online freedom in mind - [Blocked by ORG](https://www.blocked.org.uk) - Check if your website is blocked by certain ISPs - [Data Rights Finder](https://www.datarightsfinder.org) - Find, understand and use information from privacy policies - [Browser Leaks](https://browserleaks.com) - Check which information is being leaked by your browser - [DNSLeakTest](https://www.dnsleaktest.com) - Check for and fix a DNS leak - [IP Leak](https://ipleak.net) - Shows your IP address, and other associated details - [ExifRemove](https://www.exifremove.com) - Remove Meta/ EXIF data online ## Anonymous Services - [NixNet](https://nixnet.services) - [Snopyta](https://snopyta.org) - [Disroot](https://disroot.org) ## Interesting Websites - [The Intercept: Surveillance Catalogue](https://theintercept.com/surveillance-catalogue) - A database secret of government and military surveillance equpment, that was leaked in the Snowden files - See also: The source code for these projects, on WikiLeaks [Vault7](https://wikileaks.org/vault7) and [Vault8](https://wikileaks.org/vault8), and the accompanying [press release](https://wikileaks.org/ciav7p1) ## Privacy-Respecting Software This section has moved to [here](https://github.com/Lissy93/personal-security-checklist/blob/master/5_Privacy_Respecting_Software.md) ## Foundations - [Contract for the Web](https://contractfortheweb.org) - [Electronic Frountier Foundation](https://www.eff.org) - Defending digital privacy + more - [OWASP Foundation](https://www.owasp.org) - [Freedom House](https://freedomhouse.org) - Fighting for freedom on the net - [Privacy International](https://privacyinternational.org) - [Open Tech Fund](https://www.opentech.fund) - [Freedom of the Press Foundation](https://freedom.press) - [Open Rights Group](https://www.openrightsgroup.org) - [LEAP Encryption Access Project](https://leap.se) - [The Guardian Project](https://guardianproject.info) - [Foundation for Applied Privacy](https://applied-privacy.net) - [Safe + Secure](https://safeandsecure.film) - advise for journalists and film makers - [Citizen Lab](https://citizenlab.ca) - [Electronic Privacy Information Center](https://epic.org) - [American Civil Liberties Union](https://www.aclu.org/issues/privacy-technology) - [Free Software Foundation](https://www.fsf.org) - [Courage Foundation](https://www.couragefound.org) - Supports those who risk life / liberty to make significant contributions to the historical record ## Government Organisations - **Citizen/ Small business Advice and Infrormation** - [UK National Cyber Security Center](https://www.ncsc.gov.uk) - [US Cybersecurity - NIST](https://www.nist.gov/topics/cybersecurity) - [Stay Safe Online](https://staysafeonline.org) - US government-backed project, aimed to inform and educate individuals and small businesses about basic digital security - **Cybercrime** - [Consumer Fraud Reporting](http://consumerfraudreporting.org) - US's Catalogue of online scams currently circulating, and a means to report cases - [Action Fraud](https://www.actionfraud.police.uk) - UK’s national reporting centre for fraud and cyber crime - **CERT** - Your local jurisdiction will likely have a Computer emergency response team (historically known as CERT). Who is in charge of handline handles domestic and international computer security incidents. - Australia - [auscert.org.au](https://www.auscert.org.au) - Austria - [cert.at](https://www.cert.at) - Bangladesh - [cirt.gov.bd](https://www.cirt.gov.bd) - Bolivia - [cgii.gob.bo](https://cgii.gob.bo) - Brazil - [cert.br](https://www.cert.br) - Canada - [cyber.gc.ca](https://cyber.gc.ca/en/about-cyber-centre) - China - [cert.org.cn](https://www.cert.org.cn) - Columbia - [colcert.gov.co](http://www.colcert.gov.co) - Croatia - [carnet.hr](https://www.carnet.hr) - Czech Republic - [csirt.cz](https://csirt.cz) - Denmark - [cert.dk](https://www.cert.dk) - Ecuador - [ecucert.gob.ec](https://www.ecucert.gob.ec) - Egypt - [egcert.eg](https://www.egcert.eg) - Estonia - [ria.ee / CERT-EE](https://ria.ee/en/cyber-security/cert-ee.html) - Finland - [kyberturvallisuuskeskus.fi](https://www.kyberturvallisuuskeskus.fi/en/homepage) - France - [cert.ssi.gouv.fr](https://www.cert.ssi.gouv.fr) - Germany - [cert-bund.de](https://www.cert-bund.de) - Ghana - [nca-cert.org.gh](https://nca-cert.org.gh) - Hong Kong - [hkcert.org](https://www.hkcert.org) - Iceland - [cert.is](https://www.cert.is) - India - [CERT-IN](https://www.cert-in.org.in) - Indonesia - [idsirtii.or.id](https://idsirtii.or.id) - Iran - [cert.ir](https://cert.ir) - Italy - [cert-pa.it](https://www.cert-pa.it) - Japan - [JPCERT](https://www.jpcert.or.jp) - Kyrgyzstan - [cert.gov.kg](http://cert.gov.kg) - Luxembourg - [circl.lu](https://circl.lu) - Macau - [mocert.org](www.mocert.org) - Malaysia - [mycert.org.my](http://www.mycert.org.my) - Morocco - [educert.ma](http://www.educert.ma) - Netherlands - [ncsc.nl](https://www.ncsc.nl) - New Zealand - [cert.govt.nz](https://www.cert.govt.nz) - Nigeria - [cert.gov.ng](https://cert.gov.ng) - Norway - [norcert](https://www.nsm.stat.no/norcert) - Pakistan - [pakcert.org](http://www.pakcert.org) - Papua New Guinea - [pngcert.org.pg](https://www.pngcert.org.pg) - Philippines - [cspcert.ph](https://cspcert.ph) - Poland - [cert.pl](https://www.cert.pl) - Portugal - [cncs.gov.pt/certpt](https://www.cncs.gov.pt/certpt) - Qatar - [qcert.org](https://qcert.org) - Rep of Ireland - [ncsc.gov.ie](https://www.ncsc.gov.ie) - Romania - [cert.ro](https://www.cert.ro) - Russia - [gov-cert.ru](http://www.gov-cert.ru) / [cert.ru](https://www.cert.ru) - Singapore - [csa.gov.sg/singcert](https://www.csa.gov.sg/singcert) - Slovenia - [sk-cert.sk](https://www.sk-cert.sk) - South Korea - [krcert.or.kr](https://www.krcert.or.kr) - Spain - [incibe.es](https://www.incibe.es) - Sri Lanka - [cert.gov.lk](https://www.cert.gov.lk) - Sweden - [cert.se](https://www.cert.se) - Switzerland - [govcert.ch](https://www.govcert.ch) - Taiwan - [twcert.org.tw](https://www.twcert.org.tw) - Thailand - [thaicert.or.th](https://www.thaicert.or.th) - Tonga [cert.to](https://www.cert.to) - Ukraine - [cert.gov.ua](https://cert.gov.ua) - UAE - [tra.gov.ae/aecert](https://www.tra.gov.ae/aecert) - United Kingdom - [ncsc.gov.uk](https://www.ncsc.gov.uk) - United States - [us-cert.gov](https://www.us-cert.gov) ## Data and API's - [Exploit Database](https://www.exploit-db.com) - A database or Current software vulnerabilities - [That One Privacy Site](https://thatoneprivacysite.net/#detailed-vpn-comparison) - Detailed VPN Comparison Data - [Exodus](https://reports.exodus-privacy.eu.org/en/trackers/stats) - Trackers in Android Apps - [URLScan](https://urlscan.io) - Service scanning for malisious domains - [Dehashed](https://www.dehashed.com/breach) - Data Breaches and Credentials - [VirusTotal](https://developers.virustotal.com/v3.0/reference) - Detailed virus scans of software - Hosts to block: [someonewhocares/ hosts](https://someonewhocares.org/hosts) and [StevenBlack/ hosts](https://github.com/StevenBlack/hosts) ## Academic Journals - [Crypto Paper](https://github.com/cryptoseb/cryptopaper) by Crypto Seb- Privacy, Security, and Anonymity For Every Internet User ## Implementations and Standards - [The GNU Privacy Guard](https://www.gnupg.org) - [OpenPGP JavaScript Implementation](https://openpgpjs.org) - [WireGuard](https://www.wireguard.com/papers/wireguard.pdf) - [Nym](https://as93.link/nym-blog-post) - Next Generation of Privacy infrastructure ## Mega Guides - by [Fried](https://fried.com/privacy) - by [ivpn](https://www.ivpn.net/privacy-guides) - by [ProPrivacy](https://proprivacy.com/guides/the-ultimate-privacy-guide) - by [Heimdal Security](https://heimdalsecurity.com/blog/cyber-security-mega-guide) - by [Wired](https://www.wired.com/2017/12/digital-security-guide) - by [Vice](https://www.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide) ## More Awesome GitHub Lists - [privacy-respecting](https://github.com/nikitavoloboev/privacy-respecting) by @nikitavoloboev - [awesome-privacy](https://github.com/KevinColemanInc/awesome-privacy) by @KevinColemanInc - [Security_list](https://github.com/zbetcheckin/Security_list) by @zbetcheckin - [awesome-security](https://github.com/sbilly/awesome-security) by @sbilly - [awesome-sec-talks](https://github.com/PaulSec/awesome-sec-talks) by @PaulSec - [awesome-crypto-papers](https://github.com/pFarb/awesome-crypto-papers) by @pFarb - [awesome-threat-intelligence](https://github.com/hslatman/awesome-threat-intelligence) by @hslatman - [awesome-incident-response](https://github.com/meirwah/awesome-incident-response) by @meirwah - [awesome-anti-forensic](https://github.com/remiflavien1/awesome-anti-forensic) by @remiflavien1 - [awesome-malware-analysis](https://github.com/rshipp/awesome-malware-analysis) by @rshipp - [awesome-honeypots](https://github.com/paralax/awesome-honeypots) by @paralax - [awesome-hacking](https://github.com/carpedm20/awesome-hacking) by @carpedm20 - [awesome-pentest](https://github.com/enaqx/awesome-pentest) by @enaqx - [awesome-ctf](https://github.com/apsdehal/awesome-ctf) by @apsdehal ## Unrelated Awesome Lists - [awesome]( https://github.com/sindresorhus/awesome) by @sindresorhus - [lists](https://github.com/jnv/lists) by @jnv --- *Thanks for visiting, hope you found something useful here :) Contributions are welcome, and much appreciated - to propose an edit [raise an issue](https://github.com/Lissy93/personal-security-checklist/issues/new/choose), or [open a PR](https://github.com/Lissy93/personal-security-checklist/pull/new/master). See: [`CONTRIBUTING.md`](/.github/CONTRIBUTING.md).* *Licensed under [Creative Commons, CC BY 4.0](https://creativecommons.org/licenses/by/4.0/), © [Alicia Sykes](https://aliciasykes.com) 2020* [![Attribution 4.0 International](https://licensebuttons.net/l/by/3.0/88x31.png)](https://github.com/Lissy93/personal-security-checklist/blob/master/LICENSE.md) ---- Found this helpful? Consider sharing it with others, to help them also improve their digital security 😇 [![Share on Twitter](https://img.shields.io/badge/Share-Twitter-17a2f3?style=for-the-badge&logo=Twitter)](http://twitter.com/share?text=Check%20out%20the%20Personal%20Cyber%20Security%20Checklist-%20an%20ultimate%20list%20of%20tips%20for%20protecting%20your%20digital%20security%20and%20privacy%20in%202020%2C%20with%20%40Lissy_Sykes%20%F0%9F%94%90%20%20%F0%9F%9A%80&url=https://github.com/Lissy93/personal-security-checklist) [![Share on LinkedIn](https://img.shields.io/badge/Share-LinkedIn-0077b5?style=for-the-badge&logo=LinkedIn)]( http://www.linkedin.com/shareArticle?mini=true&url=https://github.com/Lissy93/personal-security-checklist&title=The%20Ultimate%20Personal%20Cyber%20Security%20Checklist&summary=%F0%9F%94%92%20A%20curated%20list%20of%20100%2B%20tips%20for%20protecting%20digital%20security%20and%20privacy%20in%202020&source=https://github.com/Lissy93) [![Share on Facebook](https://img.shields.io/badge/Share-Facebook-4267b2?style=for-the-badge&logo=Facebook)](https://www.linkedin.com/shareArticle?mini=true&url=https%3A//github.com/Lissy93/personal-security-checklist&title=The%20Ultimate%20Personal%20Cyber%20Security%20Checklist&summary=%F0%9F%94%92%20A%20curated%20list%20of%20100%2B%20tips%20for%20protecting%20digital%20security%20and%20privacy%20in%202020&source=) [![Share on Mastodon](https://img.shields.io/badge/Share-Mastodon-56a7e1?style=for-the-badge&logo=Mastodon)](https://mastodon.social/web/statuses/new?text=Check%20out%20the%20Ultimate%20Personal%20Cyber%20Security%20Checklist%20by%20%40Lissy93%20on%20%23GitHub%20%20%F0%9F%94%90%20%E2%9C%A8)