Replying to Avatar Co ⚡or

5. EMAIL CLIENTS

There is no one-size-fits-all solution for private and secure email communication. The level of privacy you desire depends on the information you need to keep confidential and your willingness to use encryption software. "It's essential to assess your specific threat model" (EFF).

While email can be secured with encryption tools like PGP, it's important to recognize that even encrypted emails may still be vulnerable to metadata exposure.

If privacy and security are paramount for your communication needs, consider using end-to-end encrypted messaging apps instead of relying solely on email. However, if you decide to use email for sensitive communications, ensure the service provider maintains strong privacy protections and encryption practices, as well as resistance to government pressure and censorship.

It’s useful also to use email providers that allow you to create multiple email addresses, as to use the same address for all logins, you’re just asking to be found, by literally anyone. This is particularly useful when signing up to one sales promotions, and all sorts of random real world shit. if you can have disposable email addresses, it will save you a lot of unnecessary problems down the line.

Stop Using: Gmail, Apple Mail, Outlook, Yahoo, Yandex.

Start Using:

🔻 Proton Mail is a Swiss-based email service that offers end-to-end encryption (E2EE) with PGP keys. It has a strong commitment to user privacy. The company's zero-access encryption feature ensures that even if compelled by authorities, they cannot access the contents of encrypted emails. As a side note, they also provide a stealth vpn protocol (a TLS tunnel), which is helpful if an ISP blocks access to protons primary servers.

🔻Tuta (Formerly Tutanota): Tuta is a German based email provider offering end-to-end encryption with PGP keys. It respects users' privacy by encrypting all emails on the server, making it difficult for authorities to access message contents even if compelled. The company's commitment to user privacy and self-hosting capabilities make it resistant to government pressure and censorship.

🔻 Posteo is a German email service providing PGP encryption and respecting the right to privacy according to Article 17 of the EU Copyright Directive. Its resistance to government pressure comes from its policy of not collecting metadata or compromising user data even if faced with legal demands.

🔻RiseUp is a collective-funded email provider that prioritizes privacy and security. It offers end-to-end encryption with PGP keys, supports self-hosting, and respects user privacy by not collecting any data or metadata. Its decentralized structure and cooperative model make it resistant to government pressure and censorship.

🔻SimpleLogin is also great for creating email aliases to log into sites without signing your primary email up to spam abuse. 100% open source.

more info:

https://digdeeper.club/articles/email.xhtml

https://reddit.com/r/privacy/comments/16oxyqm/what_is_the_best_private_and_secure_email_to_use/

6. CLOUD STORAGE

Cloud storage has been criticized for unnecessarily exposing data to privacy intrusions, censorship risks, custodial issues, and rising costs. Instead of relying on centralized services, consider using decentralized or self-hosted alternatives that give you control over your data. Alternatively use a backup hard drive and skip the cloud altogether.

Stop Using: Google Drive, DropBox, Sync, One Drive, Mega

Start Using:

🔻ProtonDrive offers end-to-end encryption and zero-knowledge privacy. It provides 15 GB of free storage with the option to upgrade for more space, whilst ensuring your files remain confidential.

🔻Nord Locker is a secure cloud storage solution from NordVPN that utilizes zero-knowledge encryption, allowing only you to access your encrypted data. It offers 3 GB of free storage with the option to upgrade for additional space.

🔻Syncthing is a decentralized, open-source file synchronization tool that enables users to maintain complete control over their data. It doesn't store files on centralized servers and instead relies on direct device-to-device synchronization.

🔻Nextcloud is a self-hosted, open-source cloud storage solution that allows you to manage your own server and data. It offers features like end-to-end encryption, file versioning, and collaboration tools for secure sharing.

🔻@umbrel, as well as being a Bitcoin node, Umbrel provides a self-hosted, decentralized cloud storage service built on top of the InterPlanetary File System (IPFS). It provides users with full control over their data and enables direct device-to-device synchronization.

🔻Start9 is a self-hosted cloud storage solution that uses IPFS for decentralized file management. It's portable, low-power design makes it easy to set up and maintain your own private cloud storage server. Also a Bitcoin node.

🔻Tresorit is an encrypted, Swiss-based cloud storage service offering end-to-end encryption and zero-knowledge privacy. It provides 3 GB of free storage with the option to upgrade for additional space.

🔻Peergos is a decentralized, open-source cloud storage platform built on IPFS. It enables users to store their files in a secure, peer-to-peer network without relying on centralized servers.

Remember that no cloud storage solution can guarantee absolute privacy and security, at least not better than you can with simple encryption and a local set-up

Reply to this note

Please Login to reply.

Discussion

7. NOTEBOOKS

Note-taking apps have become increasingly popular for organizing thoughts, ideas, and sensitive information. However, not all note-taking apps prioritize privacy and security to the same extent.

When evaluating notebooks, think about end-to-end encryption, zero-knowledge encryption, decentralized storage, and data ownership.

Stop Using: Evernote, Apple Notes, Microsoft OneNote, Google Keep, Simple note

Start Using:

🔻Standard Notes features include end-to-end encryption, zero-knowledge encryption, and a decentralized model where users can host their own notes on personal servers or use third-party services like Blockstack.

🔻 Simplenote is a free, open-source note-taking app that prioritizes simplicity and privacy. It doesn't collect any user data and offers offline support for taking notes when you're not connected to the internet.

🔻Bear Notes uses end-to-end encryption and doesn't store any of your content on their servers, making it a secure option for storing sensitive information.

🔻Zoho Notebook is a note-taking app that offers strong privacy features like end-to-end encryption and zero-knowledge encryption. It's available as part of the Zoho One suite or as a standalone app.

🔻Turtl is a privacy-focused note-taking app that offers end-to-end encryption, zero-knowledge encryption, and IPFS-based decentralized storage. Users can host notes on personal computers or third-party nodes for enhanced security and privacy.

🔻Joplin is a free, open-source note-taking app that prioritizes privacy and security. It offers encryption for sensitive information, offline support, and the option to sync notes with local devices or cloud services like Nextcloud, Dropbox, and ownCloud.

8. PASSWORD MANAGERS

Password managers are an improvement from not storing passwords at all, using a a notepad or relying on Silicon Valley tech giants to store on your behalf. They are also valuable in creating unique, impossible to guess passwords, that otherwise wouldn't be created. They enhance security, reduce human error, enable secure sharing, and provide easy access to online accounts, ultimately improving overall digital security.

Stop Using: LastPass, 1Password, Keeper, Google Password Manager, Samsung Pass.

Start Using:

🔻 NordPass is a closed-source password manager offering E2EE cloud syncing, multi-factor authentication (MFA), AES-256 encryption, and zero-knowledge storage. NordPass prioritizes user privacy and security with a focus on simplicity and ease-of-use.

🔻 Bitwarden is an open-source password manager that stands out for its E2EE cloud syncing, built-in MFA, data breach alerts, and AES-256 encryption. Bitwarden offers a comprehensive set of security features, making it an ideal solution for organizations and individuals concerned about privacy.

🔻 Proton_Pass is a zero-knowledge, open-source password manager emphasizing privacy and security. Proton Pass offers E2EE cloud syncing, local storage options, and AES-256 encryption for storing passwords. Its focus on user control and decentralized storage solutions make it an attractive option for those seeking maximum privacy and autonomy in their password management.

🔻 Less Pass is a simple, open-source password manager that prioritizes security by using local storage with AES encryption. LessPass does not rely on centralized servers or cloud syncing, offering a convenient and secure solution for those who prefer offline password management.

🔻 KeePass is an open-source password manager offering local storage with AES encryption and auto-type functionality. Keepass supports various plugins for added security features, making it a customizable solution for those who want more control over their password management.

🔻KeePassXC is an open-source, cross-platform password manager that offers local storage with AES-256 encryption and auto-type functionality. KeePassXC supports various plugins for added security features and has a large user base, making it a popular choice among those seeking secure password management.

Open source solutions are preferred for their ability to be audited by third parties. Cloud syncing with end-to-end encryption (E2EE) provides the convenience of accessing passwords across multiple devices while maintaining privacy.

Additional features such as built-in multi-factor authentication (MFA), data breach alerts, backup/export functions, web browser access, password generators, and support for advanced key derivative functions (KDFs) like Argon2 are important factors in evaluating password managers.

If you’re migrating from manually created passwords to a password manager. Take the opportunity to replace those passwords first, as there is a good opportunity that they are already compromised. You certainly don’t want your password listed on a compromised password database that some 12 year old can easily find and run the most basic of exploits.

Dig Deeper: https://reddit.com/r/Passwords/comments/17f73pa/i_made_a_comparison_table_to_find_the_best/

https://docs.google.com/spreadsheets/d/1b2zEEU8_YPsgo3nY1BJ72qgLXteP7Yt0_mnlYJ8m0RI/

9. OPERATING SYSTEMS

Unfortunately, many closed-source, proprietary operating systems jeopardize user privacy due to their permissioned nature, built-in Digital Rights Management (DRMs), and GPS tracking on mobile devices. Desktop and mobile OSs come with unique privacy concerns and need to be evaluated separately. Luckily, we have Linux based distros as an alternative to Windows & Mac, as well as custom ROM alternatives for Android systems using Google Pixel phones. It’s a tough ask to use less used Operating Systems for most people, but it’s good to know that there are solutions available for those who are opposed to snooping.

Stop Using: Windows, MacOS, Android, IOS.

Start Using:

Mobile:

🔻 Graphene is a hardened offers a secure and customizable experience by providing an open-source, forked version of Android. So you get the Android experience, without the interference and the bloatware. It provides our sandboxed Google Play compatibility layer:

🔻Calyx is another privacy-conscious option for Android-based devices, CalyxOS emphasizes user autonomy and privacy through its custom ROM, featuring enhanced security features and strict adherence to user privacy principles.

🔻DivestOS is a mobile OS focused on harm reduction for end-of-life devices. . It is a soft fork of LineageOS that aims to increase security and privacy.

Desktop:

🔻Tails is FOSS OS based on Debian, Tails provides a secure environment by using the Tor network for browsing the web anonymously. It can be run from a USB stick, leaving no trace on the computer when shut down.

🔻Qubes is a utilizes hardware virtualization to separate applications and data, ensuring that sensitive information remains isolated.

🔻Ubuntu / Fedora / Whonix distributions provide strong privacy features by default, such as built-in encryption, anonymous browsing capabilities, and a focus on open-source software.

As Smartphone privacy alternatives are limited to Google Pixel phones. It’s expected that most people will stick with Apple/Android. In which case, it’s advisable to use device-level encryption to secure your device at a hardware level. For example, Apple's iOS devices use FileVault encryption, while Android devices typically have AES-256 encryption. Samsung also allows full-device encryption using Knox, while Blackberry have a similar solution in SafeZone.

Dig Deeper:

https://privacytools.io/os

https://www-kuketz--blog-de.translate.goog/android-grapheneos-calyxos-und-co-unter-der-lupe-custom-roms-teil1/

https://privacyguides.org/en/mobile-phones/

https://eylenburg.github.io/android_comparison.htm

https://privsec.dev/posts/android/choosing-your-android-based-operating-system/

10. AI CHATBOTS

Large language models (LLMs) have been assisting us with all kinds of tasks from writing blogs, books and code to answering all sorts of questions we used to ask Google. But as the old saying goes, if something on the Internet is free, the real product is you (and your data). So the onus is placed on us as individuals to find AI solutions, where we are the users, not the product.

AI is fundamentally ‘a surveillance technology’

- meredith Whittaker

It's a given that people will be using Chatbots henceforth, so the challenge is to move away from the easy solution and find the privacy level that suits you.

When using chatbots, look for platforms that allow private prompt storage, E2EE support, and anonymous usage. This approach will help protect your conversations and maintain anonymity.

Stop Using: Open Ai, xAi/Grok, Shapchat, Claude, Gemini, Samsung Galaxi Ai, Google Gemini, Stable Diffusion,

Start Using: Venice.ai, HuggingChat, Start9, llama file

As far as I can tell, the most private and secure approach to running AI chatbots boils down to three options:

1⃣ Download privacy-respecting AI chatbots like Venice and Hugging Face and run them locally on a desktop or phone entirely OFFLINE. While an air-gapped environment is ideal for maximum security, it's not always necessary. Ensure the operating system is encrypted to protect local data files.

2⃣ Download llama file and run privacy-respecting AI chatbots through its platform. This approach offers E2EE for confidential conversations and data protection, ensuring no data collection or sharing occurs for advertising/analytics purposes. However, this option requires interaction with external servers.

3⃣ Run ChatGPT on a start9 server. Start9 enables decentralized storage and processing without airgapping while maintaining local privacy features. User data remains on the device or within a private network, reducing the risk of breaches and unauthorized access.

While both options provide E2EE, Start9's E2EE is limited to user interactions, whereas LLaMA File encompasses conversations with its AI models.

Comparing Options B and C, running ChatGPT on a Start9 offers more control over data processing since it happens locally on your device. If you prioritize local privacy without the need for air gapping, Start9 might be an ideal choice.

Dig Deeper:

https://hackaday.com/2023/07/30/self-hosted-chatbot-focuses-on-privacy/

https://kdnuggets.com/distribute-and-run-llms-with-llamafile-in-5-simple-steps

More info on the dangers: 1⃣https://arstechnica.com/gadgets/2024/05/microsofts-new-recall-feature-will-record-everything-you-do-on-your-pc/

2⃣https://arstechnica.com/gadgets/2024/06/report-new-apple-intelligence-ai-features-will-be-opt-in-by-default/

3⃣https://reddit.com/r/privacy/comments/1dfrojd/former_head_of_nsa_joins_openai_board/

11. VPNs

VPNs are key component of the privacy and security toolkit by preventing others from monitoring your online behavior. They create an encrypted connection between your device and a remote server, helping you access blocked content and conduct research without revealing your location.

Good VPNs don't keep logs and do cost money; free ones often collect data for advertising. VPN limitations include not protecting against malware, password theft, or complete anonymity. Your provider, partners, used sites/services, and governments may still track your online activities.

Stop Using: Hide My Ass, Express VPN , Pure VPN, Opera Free VPN, VPNSecure, VPN Master, Windscribe, Hotspot Shield VPN

Start Using:

🔻 ProtonVPN is operated by the same team behind ProtonMail, this VPN offers AES-256 encryption, DNS leak protection, and a no-logs policy for strong security. Its range of security features make it an attractive choice for those seeking privacy.

🔻NordVPN is a popular VPN provider known for its user-friendly interface and privacy features. NordVPN uses the NordLynx protocol (based on WireGuard) for faster speeds while maintaining security, along with a strict no-logs policy.

🔻 Mullvad is a popular Swedish solution that uses secure WireGuard protocol and doesn't keep any logs. Payments can be made in cash or cryptocurrencies for added anonymity.

🔻 ivpnnet is a privacy-focused VPN that doesn't collect or store any personal data on sign-up, not even email addresses. Payments can be made via cash, monero, or bitcoin for added anonymity.

Dig Deeper: https://securityplanner.consumerreports.org/tool/virtual-private-network-vpn

https://restoreprivacy.com/vpn/warning-list/

https://x.com/josephmenn/status/1437885720169836544

12. VIDEO HOSTING

YouTube is famous for censoring and cancelling content creators, raising the alarm bells about online freedom of speech and the need for privacy-respecting, censorship-resistant alternatives.

Moving away from YouTube is difficult though, as it has the largest repository of video content in the world. That said, the onus is on us to support platforms which champion privacy and/or free speech so that honest content has an outlet.

Stop Using: YouTube, Vimeo, Dailymotion, Twitch

Start Using:

🔻 BitChute is a decentralized video-sharing offering a censorship-resistant environment for content creators and viewers, making it an ideal alternative to centralised platforms.

🔻 LBRY is an open-source, peer-to-peer content distribution network that allows users to upload and share videos while maintaining control over their content. This platform doesn't rely on a centralized authority, reducing the risk of censorship.

🔻 Peertube is a decentralized video-sharing platform built on WebTorrent technology. It's an open-source project prioritising privacy and free speech. PeerTube uses a peer-to-peer model to reduce server load and provide an ad-free experience without tracking user activities.

🔻 Rumble is perhaps most recognised as a censorship free YouTube alternative. On their website, they state “we may process only minimal user data, only as much as it is absolutely necessary to maintain the website. Information collected automatically is used only to identify potential cases of abuse and establish statistical information regarding website usage”. The question remains, how much data is collected, what constitutes abuse and for how long can they resist censorship? That said, it's still better than YouTube.

Dig Deeper:

https://vdocipher.com/blog/2021/02/top-12-online-video-platforms-like-youtube-2021/#:~:text=Few%20alternate%20video%20platforms%20similar,Alternative%2C%20Vimeo%20alternative%20and%20more

14. BUYING BITCOIN

There is no disputing that Bitcoin is the most secure P2P network ever built. The on-ramps and off-ramps cannot boast the same level of assuredness, as centralized exchanges are widely recognised as a point of weakness, censorship and privacy abuse.

In contrast, P2P networks like BitTorrent, LimeWire or The Pirate Bay could never be shut down because they provide no single point of failure. P2P Bitcoin exchanges embody the same spirit and technology that underpins the torrent sites, creating marketplaces that allow people to buy and sell Bitcoin.

Stop Using: Coinbase, Kraken, Binance, Bitstamp, Revolut, OKX, Paypal,

Start Using:

🔻 Bisq is FOSS, is fully decentralized bitcoin exchange that enables P2P trading without KYC/AML checks. A self-hosted interface provides direct, anonymous transactions. It offers different types of payments, including face-to-face and cash, making it an ideal KYC-free solution.

🔻 RoboSats is a peer-to-peer, non-custodial Bitcoin exchange ideal for onboarding new users as it’s easy and quick to use. It requires no KYC since it’s based on pseudonymous avatars that allow customers to trade Bitcoin over the Lightning Network using the TOR browser only.

🔻 Vexl is non-custodial P2P mobile app without KYC/AML requirements. It provides a simple, inclusive, secure and private way to buy and sell BTC as it was intended: peer-to-peer.

🔻 Noones enables anonymous peer-to-peer bitcoin trades through an encrypted messaging system and secure payment channels. This platform eliminates intermediaries, ensuring user privacy and freedom.

🔻 Hodl Hodl connects buyers and sellers of cryptocurrency for direct P2P trading without KYC/AML checks. Users remain anonymous while securely exchanging bitcoin within a decentralized marketplace.

🔻 Peach is a decentralized marketplace unites buyers and sellers through encrypted messaging channels, eliminating intermediaries and compliance demands. Anonymity is preserved.

🔻 LocalCoinSwap is a KYC-free, peer-to-peer, non-custodial exchange that uses escrow protection for users who can buy and sell bitcoin with several payment methods, including cash in-person, cash by mail and gift cards for better anonymity.

Dig Deeper:

https://bitcoinmagazine.com/guides/how-to-buy-bitcoin-anonymously

15. DNS SERVERS

A DNS server is like a phone book that helps your computer find the address of a website you are trying to visit. Unfortunately, free DNS providers and local ISPs have removed many of the phone book's pages and track every page you turn. To solve this, you just need to find a different DNS.

Stop Using: Google Public DNS, Comcast DNS, Verizon DNS, OpenDNS and the default DNS from Local ISPs.

Start Using:

🔻 NextDNS blocks security threats, ads, and trackers while providing easy setup guides for all systems. Enjoy a free plan with up to 300,000 queries/month or upgrade for premium features.

🔻 AdGuard DNS offers ad-blocking and tracker-blocking capabilities with support for encrypted protocols like DoT and DoH. The free plan is limited to five devices.

🔻 Quad9 provides an open DNS recursive service that prioritizes security and privacy, offering a free solution for all users.

🔻 Cloudflare high-performance DNS resolver supports encrypted protocols like DoT and DoH while maintaining fast speeds and reliability.

🔻 Pie-Hole DNS is a self-hosted solution ideal for experts using Raspberry Pi or Linux-based systems. It offers powerful ad-blocking capabilities with customizable settings.

🔻 dnscrypt-proxy provides a flexible, open-source DNS proxy supporting modern encrypted protocols like DoH, DNSCrypt V2, and Anonymized DNSCrypt.

🔻 Unbound is a validating, recursive, caching DNS resolver that supports DNS-over-TLS for enhanced privacy. It's designed to be fast, lean, and secure with regular audits.

🔻 Nebula offers a light-weight, customizable, and battery-efficient DNS changer for Android devices. Perfect for those looking for a simple yet effective solution.

🔻 DNSCloak is an iOS GUI wrapper that enables encrypted DNS on iPhones and iPads by utilizing dnscrypt-proxy. It provides a user-friendly interface for managing DNS settings.

Dig Deeper:

https://recordedfuture.com/threat-intelligence-101/cyber-threat-landscape/dns-servers

https://privacytools.io/encrypted-dns

https://dnswatch.com/dns-docs/

16. SEARCH ENGINES

"Search" is overwhelmingly dominated by a small number of companies, particularly Google (90%) and Microsoft. These companies are filtering, favouring, and blocking results. Sadly many of the private search engines rely on these companies as a data source, and as such their results are filtered by default. Search Engines also track everything we search, they literally know our thoughts better than we do.

The battle here is on two fronts (privacy & censorship).

Privacy-preserving and censorship-resistant search engines provide an alternative to the Google panopticon. So it's highly recommended to protect ourselves and support these companies.

Stop Using: Google Search, Bing, Yandex, Yahoo (Bing)

Start Using:

🔻 Brave Search is a private and secure search engine that respects user privacy. Built on Brave's blockchain-based platform, it aims to provide users with accurate and relevant results while keeping data collection and tracking at bay.

🔻 DuckDuckGo doesn't track or store user data. Its focus on user privacy has made it a go-to option for those an escape from excessive tracking. DuckDuckGo has no relationship with Google, nor do they source any of our search results from Google.

🔻 MetaGer is a German-developed search engine that prioritizes user privacy through encrypted connections and anonymized search results.

🔻 Startpage is a Netherlands-based search engine that anonymizes your searches by using proxies to retrieve results from Google without storing any personal information.

🔻 Searx_engine is a decentralized, privacy-preserving search engine that allows users to access multiple search engines simultaneously. Its focus on user privacy and transparency has made it a popular choice among privacy-conscious individuals.

🔻 Mojeek is a UK-based search engine that aims to provide accurate results while respecting user privacy. It uses its own index of websites and doesn't rely on third-party data sources.

🔻 Swisscows is a Swiss based search engine that prioritizes user privacy by not storing any personal information or tracking user data.

🔻 Qwant is a France-based search engine that doesn't store user data or logs. Its decentralized approach to search ensures a more private experience for users while providing accurate and relevant results.

Dig Deeper:

https://restoreprivacy.com/private-search-engine/

https://privacytools.io/private-search

Friends don’t let friends use google products.

13. MONEY / PAYMENTS

Let's talk about money and payments. The legacy financial system provides absolutely no privacy, nor is it an equitable system. The move towards CBDCs will make it even less private and less equitable. So it's of utmost importance that we find a money system that's fair and a discreet payments system.

Stop Using: Credit/Debit cards, Stablecoins (Tether), Shitcoins, Paypal, Revolut, Venmo, Stripe, and so on.

Obviously, we cannot just exit the fiat world... but we can begin to move away on our own terms, whilst the options remain available.

Start Using:

🔻 Let's start with Bitcoin, which is the fairest system of them all, but not private, as it's built upon a public blockchain. It cannot be censored and has no kyc/aml requirement, so you can use it without doxxing yourself. It's also perhaps the only shot that we have of breaking the back of the incumbent unfair system. Everyone should own some Bitcoin.

Privacy & payments on the Bitcoin network are available on a growing number of layer two solutions (notably: eCash, Ark Protocol, The Lightning Network)

Bitcoin Layer 2:

🔻 The Lightning Network is a second-layer protocol designed to enable off-chain Bitcoin transactions, which are later settled on the Bitcoin blockchain. Lightning payments are extremely fast and quite cheap and provides privacy benefits for those who run their own nodes. Nostr Zaps are powered by the lightning network.

🔻 Ark Protocol is a layer-two solution for making off-chain Bitcoin transactions. is a payments system where people can make Bitcoin transactions at very low cost and without requiring any setup. The Ark model very closely resembles the UTXO model, which is a key differentiator with the Lightning network.

🔻 eCash

- Cashu utilises Chaumian ecash, a form of digital cash created by legendary cryptographer Dr. David Chaum in 1982. Ecash was waiting for Bitcoin as a foundational layer, which it now has. Ecash uses a mint, and is a bearer asset that can be transferred peer-to-peer, much like bitcoin. However, a key difference between ecash and bitcoin is that bitcoin exists on a ledger, whereas ecash lives on its holder’s device. Cashu is also available on the nostr network.

- Fedi is is an open-source eCash protocol for managing Bitcoin within a community. It is a system that uses a group of trusted members, called a federation, to hold and manage bitcoin for users.

🔻 Cash is a payment technology that's inevitably going to fail. Why? Society will continue to become more digitised and global, leaving little room for cash to continue. That said, we should use it while we still can, as it has the best privacy preserving properties of all. It's strong on privacy, weak on savings.

There are privacy protecting crypto alternatives like Monero & ZCash, however they have weak stores of value properties, and thus difficult to champion.