personal-security-checklist/4_Privacy_And_Security_Links.md
2020-05-31 20:02:21 +01:00

48 KiB
Raw Blame History

Awesome Privacy & Securty Awesome PRs Welcome License Contributors

A curated list of notable guides, articles, tools and media - relating to digital security, internet freedom and online privacy

See also: Personal Security Checklist | Privacy-Respecting Software | Security Gadgets | Why Privacy Matters | TLDR🔐

How-To Guides

  • Threat Protection
    • Protect against SIM-swap scam: via wired
    • How to spot a phishing attack: via EFF
    • Protection from Identity Theft: via Restore Privacy
    • Harden your MacOS Security: via @drduh on GitHub
    • Protecting from key-stroke-logging, with KeyScrambler: via TechRepublic
    • Permanently and Securely Delete Files and Directories in Linux: via TechMint
  • Netowkring
    • How to enable DNS over HTTPS: via geekwire
    • How to resolve DNS leak issue: via DNSLeakTest
    • Protect against WebRTC Leaks: via Restore Privacy
    • ISP and DNS privacy tips: via bluz71
    • Complete guide to configureing Firefox for Privacy + Speed: via 12bytes
    • Beginners guide on getting started with Tor: via ProPrivacy
    • Beginners guide to I2P: via The Tin Hat
    • How to Use a VPN and Tor together: via ProPrivacy
  • Communication
    • Email Self-Defense, Configure your mail client securly, from scratch - via FSF.org
    • How to avoid Phishing Attacks: via EFF
    • How to use PGP: Via EFF - Windows, MacOS and Linux
  • Devices
    • How to Enable Encryption on your Devices: via SpreadPrivacy.com
    • How to Delete your Data Securely: Via EFF - Windows, MacOS and Linux
    • Layers of Personal Tech Security: via The Wire Cutter
    • Improving security on iPhone: via lifehacker
    • Guide to scrubbing Windows OSs from forensic investigation: by u/moschles, via Reddit
    • A curated list of Windows Domain Hardening techniques: by @PaulSec, via: GitHub
  • Software
    • How to use Vera Crypt: via howtogeek
    • How to use KeePassXC: via EFF
  • Physical Security
  • Enterprise
  • Reference Info

Articles

Blogs

Books

  • Permanent Record by Edward Snowden
  • Sandworm by Andy Greenberg: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
  • Extreme Privacy by Michael Bazzell: Thoroughly detailed guide for protecting your privacy both electronically and physically
  • Ghost in the Wires by Kevin Mitnick: Kevin tells his story of being the world's most wanted hacker
  • The Art of Invisibility, by Kevin Mitnick: You How to Be Safe in the Age of Big Brother

Podcasts

  • Darknet Diaries by Jack Rhysider: Stories from the dark sides of the internet.
    Stitcher iTunes Spotify Google Podcasts PocketCasts
  • CYBER by Motherboard: News and analysis about the latest cyber threats
    Stitcher iTunes Spotify SoundCloud PocketCasts
  • The Privacy, Security, & OSINT Show by Michael Bazzell: Comprehensive guides on Privacy and OSINT
    Stitcher iTunes Spotify SoundCloud PocketCasts
  • Smashing Security by Graham Cluley and Carole Theriault: Casual, opinionated and humerous chat about current cybersecurity news
    Stitcher iTunes Spotify Google Podcasts PocketCasts
  • IRL Podcast by Mozilla: Online Life is Real Life, Stories about the future of the Web
    Stitcher iTunes Spotify Google Podcasts PocketCasts
  • Random but Memorable by 1Password - A Security advice podcast
    Stitcher iTunes Spotify Google Podcasts PocketCasts

More Security Podcasts on player.fm

More Podcasts (Verification Required): Naked Security | Open Source Security Podcast | Defensive Security Podcast | Malicious Life | Down the Security Rabbit Hole | Cyber Wire | Hacking Humans | Security Now | Cyber Security Interviews | Security Weekly | The Shared Security Podcast | Risky Business | Crypto-Gram Security Podcast | Off the Hook

Videos

See also: awesome-sec-talks by @PaulSec

Online Tools

  • Check and Test
  • Utilities
    • ExifRemove - Remove Meta/ EXIF data online
    • Secure Password Check - Fun little tool, to demonstrate how long it could take to crack a password
    • 33Mail or Anonaddy or SimpleLogin Protect your email address, by auto-generating unique permeant aliases for each account, so all emails land in your primary inbox
    • Deseat Me - Clean up your online presence
  • Anti-Tracking Analysis
  • Phishing, Hacking and Abuse
    • VirusTotal - Analyse a suspicious web resource for malware
    • ScamAdviser - Check if a website is a scam, before buying from it
    • Abuse IP DB - Report an IP address for abuse, spam or attacks, and check the status of any IP
    • Phish Tank - Check if a link is a known phishing URL, Submit a phishing URL, browse recent phishing URLs
    • Is It Hacked? - Check if a website or page appears to be hacked, hijacked or generally suspicious
  • IP Tools
  • Public Domain and Website Scanning Tools
    • URL Scan - Scan and analyse websites, shows IP, DNS, domain and host data, as well as info about resources and requests
    • Security Trails - Shows all DNS records, historical DNS data and sub domains
    • crt.sh - Shows current and previous SSL/ TLS certificates for a given domain, has advanced search option
    • Virus Total - Scans any URL, web asset or file for malware
    • DomainTools WhoIs - Who Is Lookup. Check who registered a domain name, and find contact details
    • Pentest Tools Vulnerability Scanner - Light scan searches for client and server-side vulnerabilities and missing HTTP security headers
    • Qualys SSL Server Test - Perform a deep analysis of the configuration of any SSL web server on the public Internet
    • Abuse IP DB - Check if an IP or domain has been reported for abuse, or file a report
    • RIPEstat - Detailed analysis of IP Addresses (Routing, DNS, Abuse History, Activity etc)
    • Multirbl - Complete IP check for sending Mailservers
    • IPVoid - Full suit of Domain, IP, and DNS tools for Tracing, Lookup, Checking and Pinging
  • Net Neutrality
  • Anonymous Services - The following sites host a veriety of anonymous online services
  • Archives
    • The Way Back Machine - See previous versions of any website. An archive of 431 billion snapshots over 20 years
    • PolitiTweet - Archives Tweets from powerful public figures, and records silent retractions and deleted tweets
    • Internet Archive Software Collection - The largest vintage and historical software library
    • OpenLibrary - A free, digital library of over 2 million eBooks, and information on over 20 million books
    • Archive-It - Collecting and accessing cultural heritage on the web

Privacy-Respecting Software

This section has moved to here. Complete list of privacy-respecting software and services

Security Hardware

This section has moved to here. Products, gadgets and DIY projects to help improve security

Data, API's and Visualisations

Academic

  • Journals
    • Rethinking information privacysecurity: Does it really matter? By Waseem Afzal: via Wiley
    • Crypto Paper: Privacy, Security, and Anonymity For Every Internet User, by Crypto Seb: via GitHub
    • Challenges in assessing privacy impact, Tales from the Front Line: via Wiley
    • A privacypreserving multifactor authentication system: via Wiley
    • Web Browser Privacy: What Do Browsers Say When They Phone Home?: via scss.tcd.ie
    • Online Tracking, A 1-million-site Measurement and Analysis: via Princeton University
    • Detecting and Defending Against Third-Party Tracking on the Web: via Franziska Roesner
    • Is Google degrading search? Consumer Harm from Universal Search: via law.berkeley.edu
    • A Comprehensive Evaluation of Third-Party Cookie Policies: via WhoLeftOpenTheCookieJar.com
    • Recognizing Speech From Gyroscope Signals: via Stanford
    • A Study of Scripts Accessing Smartphone Sensors: via sensor-js.xyz
    • Pixel Perfect, Fingerprinting Canvas in HTML5: hovav.net
    • Shining the Floodlights on Mobile Web Tracking — A Privacy Survey: via semanticscholar.org
    • Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking: via aruneshmathur.co.in
    • Privacy implications of email tracking: via senglehardt.com
    • Battery Status Not Included, Assessing Privacy in Web Standards: via princeton.edu
    • De-anonymizing Web Browsing Data with Social Networks: via princeton.edu
    • The Surveillance Implications of Web Tracking: via senglehardt.com
    • Understanding Facebook Connect login permissions: via jbonneau.com
  • Implementations and Standards

Foundations

Government Organisations

Mega Guides

More Awesome GitHub Lists


Thanks for visiting, hope you found something useful here :) Contributions are welcome, and much appreciated - to propose an edit raise an issue, or open a PR. See: CONTRIBUTING.md.

Licensed under Creative Commons, CC BY 4.0, © Alicia Sykes 2020

Attribution 4.0 International


Found this helpful? Consider sharing it with others, to help them also improve their digital security 😇

Share on Twitter Share on LinkedIn Share on Facebook Share on Mastodon