Replying to Avatar Co ⚡or

1. SOCIAL MEDIA

Let's start with social media. The entire model to date of social media networks is that we are the product, as the product is free. As the product, social networks mine and sell extensive amounts of data that they capture on each and every one of us.

Therefore.. having privacy on traditional social media is an oxymoron.. but it can be done if you use a platform that doesn't require KYC/AML data, if you use it in conjunction with other privacy tools, such as a VPN, anonymous email, etc.

Twitter bucks the trend somewhat, as it mines and sells data on you, but doesn't require KYC/AML by default. Crucially, this means anon's are not deplatformed... but for how long will this last? Premium users are already compromised.

Elon Musk is a champion of permissioned speech, not free speech. Nevertheless, he is making a concerted effort to support people's right to speak (relatively) freely. As a centralised company, it's perhaps only a matter of time before his gallant efforts are reigned in. After multiple threats from the EU, Brazil is the first to try to actually force his hand, the question is when, not if his hand be forced?

Twitter aside, if you want to use platforms that embrace truly embrace privacy and/or resistance to censorship, you'll have to settle for a platform with a smaller, and hopefully growing reach:

🔻 Nostr is a decentralized social network that focuses on privacy, free speech, and user control over their data. It uses the Noise Protocol for end-to-end encryption and allows users to verify each other's identities. Content published here is more or less immutable, it cannot be removed by he who posts or he who tries to censor. Try the clients: Damus, Primal & Amethyst and hook it up with a lightning wallet to zap Bitcoin tips.

🔻 Mastodon is a decentralized, open-source social network where users can join servers (called "instances") run by different organizations or individuals. This model promotes permissionless access while allowing for more granular control over content moderation and privacy settings.

🔻 Diaspora is another decentralized social networking platform that emphasizes user privacy and data control. It allows users to create their own "pod" (a personal server) or join existing pods, providing a more permissionless alternative to centralized social media platforms.

2. INSTANT MESSAGING

Stop Using: Slack, WhatsApp, Facebook Messenger, iMessage, Wechat, Telegram

Start Using:

🔻 Keet offers self-hosting capabilities, allowing users to control their data and communications without relying on centralized servers. End-to-end encryption ensures private conversations, making it resistant to interception or monitoring.

🔻 Nostr Protocol: Nostr's decentralized social network prioritizes privacy and freedom of expression, providing a platform for secure communication without interference from centralized authorities. Noise Protocol encryption ensures message integrity, while verified identities add an extra layer of trust.

🔻 SimpleX Chat is a fully decentralized messaging app with no central servers, no phone number or email required, minimal metadata collected, and strong anonymity through its user-centric design. Users can run their own servers and enjoy self-destructing messages for added privacy and censorship resistance.

🔻Signal provides a balance between privacy and usability through its strong end-to-end encryption. While it collects some metadata and requires a phone number, its widespread adoption ensures robust censorship-resistant properties. Signal's strong encryption requires a phone number for registration, collects some metadata such as contact discovery, is centralized with servers controlled by Signal Foundation.

🔻 Wire: Wire's self-hosting capabilities and integration with decentralized platforms like Matrix and XMPP provide users with control over their communications, making it resistant to censorship. Flexible communication options prioritize user privacy and security. However, Wire stores a list of the people/pseudonyms you contact, so they do know who is talking with whom, at least in broad strokes (your identity is as "private" as it comes up in people searches on Wire).

🔻 DarkFi: DarkFi's IPFS-based architecture ensures secure communication without relying on centralized servers or intermediaries. Its decentralized nature makes it more resilient against censorship and surveillance attempts.

🔻 Briar is designed with offline-first, encrypted messaging that resists censorship and surveillance through a decentralized node network. Messages remain private and securely transmitted, even in situations where online connectivity is limited or restricted.

🔻 Threema offers end-to-end encryption, anonymous ID options, and limited metadata collection. While centralized with servers controlled by Threema GmbH, it does have robust privacy features. Threema partially discloses its source code, allows users to use an anonymous ID instead of a phone number, collects some limited metadata, is centralized with servers controlled by Threema GmbH, requires a one-time fee, and offers robust privacy features.

🔻 Session App uses a decentralized a messaging architecture using Onion routing (Tor) for added anonymity, requiring no phone number or email, collecting minimal metadata, and featuring user IDs as public keys to provide strong anonymity. Open-source community servers allow users to run their own nodes and maintain control over their communications.

People often think of Telegram as a privacy solution, but they are mistaken, as it offers no E2EE unless bank a/c linked, which leaks KYC info. To sign up, you need to provide a phone number. Clever enough people may work around these restrictions eSims & disposable credit cards. It doesn't censor content though, which is useful.

Dig Deeper:

https://intego.com/mac-security-blog/6-secure-messaging-app-options-for-mac-and-ios/

https://x.com/schmidt1024/status/1829449672496234867

Reply to this note

Please Login to reply.

Discussion

3. VIDEO MESSAGING

By using these privacy-preserving video call solutions, you can enjoy reliable and secure video conferencing while maintaining control over your communications.

Stop Using: Google Meet, Zoom, Microsoft Teams, Skype, FaceTime

Start Using:

🔻Keet: Keet's encrypted video calls provide end-to-end encryption, ensuring private conversations without interception or eavesdropping. Self-hosting capabilities allow users to maintain control over their data and communications.

🔻 Brave Talk is a privacy-focused video conferencing feature built into the Brave browser, powered by Jitsi. It enables secure, decentralized communication without relying on centralized servers or third-party services.

🔻 Jami offers open-source, peer-to-peer video messaging that prioritizes privacy and security through end-to-end encryption and decentralized architecture. Users can establish direct connections for encrypted conversations.

🔻 Jitsi Meet is a secure, decentralized video conferencing solution using WebRTC technology for high-quality, encrypted calls without centralized servers or intermediaries. It provides flexibility and control over communication channels.

🔻 Linphone provides free, open-source, and privacy-focused video messaging and calling services with end-to-end encryption. Its decentralized architecture ensures secure communication without compromising user data.

🔻 Impervious ensures privacy through end-to-end encryption, decentralized infrastructure, anonymous user identity, self-sovereign identity solutions, and a secure video calling protocol.

https://privacytools.io/privacy-messaging

4. WEB BROWSERS

Web browsers build digital footprints of all of your online activity. It's important to move away from standard browsers that track everything we do, to browsers that allow us to be ourselves without every search being monetized and scrutinised.. If you can't make remove, at least install ad blockers to improve your privacy and experience.

Stop Using: Chrome, Safari, Opera, Firefox, Microsoft Edge, Samsung Internet.

Start Using:

🔻 Chromium: Chromium is an open-source web browser that prioritizes user data protection through private browsing modes, cookie and tracking blockers, and enhanced security measures.

🔻 Tor Browser is specifically designed for anonymity and privacy, utilizing the Tor network to encrypt and anonymize traffic, making it a popular choice for users concerned about online surveillance and tracking.

🔻 Brave Browser emphasizes privacy by blocking trackers by default, providing ad-blocking capabilities, and implementing a built-in VPN for added protection. It also offers secure browsing with HTTPS Everywhere integration.

🔻 Librewolf is a privacy-focused web browser based on Firefox, featuring enhanced privacy features like tracker-blocking, fingerprinting resistance, and improved cookie management.

🔻 Impervious is an open-source web browser built for maximum privacy and security through advanced privacy-preserving technologies, decentralized architecture and DID's.

🔻 Epic is a privacy-centric web browser that blocks trackers, ads, and third-party cookies by default, ensuring users remain anonymous and secure during their online activities.

🔻 Mullvad is a privacy-focused web browser that offers all the privacy features of Tor Browser without relying on the Tor network. This allows users to take advantage of enhanced privacy protections while still having the option to connect to trusted VPNs if desired.

🔻 DuckDuckGo is a private search engine that prioritizes user privacy by providing zero-click results, not tracking users or storing search history, and using a privacy-focused algorithm.

Read More:

https://reddit.com/r/browsers/comments/11by0m7/what_is_the_best_browser_in_terms_of/

5. EMAIL CLIENTS

There is no one-size-fits-all solution for private and secure email communication. The level of privacy you desire depends on the information you need to keep confidential and your willingness to use encryption software. "It's essential to assess your specific threat model" (EFF).

While email can be secured with encryption tools like PGP, it's important to recognize that even encrypted emails may still be vulnerable to metadata exposure.

If privacy and security are paramount for your communication needs, consider using end-to-end encrypted messaging apps instead of relying solely on email. However, if you decide to use email for sensitive communications, ensure the service provider maintains strong privacy protections and encryption practices, as well as resistance to government pressure and censorship.

It’s useful also to use email providers that allow you to create multiple email addresses, as to use the same address for all logins, you’re just asking to be found, by literally anyone. This is particularly useful when signing up to one sales promotions, and all sorts of random real world shit. if you can have disposable email addresses, it will save you a lot of unnecessary problems down the line.

Stop Using: Gmail, Apple Mail, Outlook, Yahoo, Yandex.

Start Using:

🔻 Proton Mail is a Swiss-based email service that offers end-to-end encryption (E2EE) with PGP keys. It has a strong commitment to user privacy. The company's zero-access encryption feature ensures that even if compelled by authorities, they cannot access the contents of encrypted emails. As a side note, they also provide a stealth vpn protocol (a TLS tunnel), which is helpful if an ISP blocks access to protons primary servers.

🔻Tuta (Formerly Tutanota): Tuta is a German based email provider offering end-to-end encryption with PGP keys. It respects users' privacy by encrypting all emails on the server, making it difficult for authorities to access message contents even if compelled. The company's commitment to user privacy and self-hosting capabilities make it resistant to government pressure and censorship.

🔻 Posteo is a German email service providing PGP encryption and respecting the right to privacy according to Article 17 of the EU Copyright Directive. Its resistance to government pressure comes from its policy of not collecting metadata or compromising user data even if faced with legal demands.

🔻RiseUp is a collective-funded email provider that prioritizes privacy and security. It offers end-to-end encryption with PGP keys, supports self-hosting, and respects user privacy by not collecting any data or metadata. Its decentralized structure and cooperative model make it resistant to government pressure and censorship.

🔻SimpleLogin is also great for creating email aliases to log into sites without signing your primary email up to spam abuse. 100% open source.

more info:

https://digdeeper.club/articles/email.xhtml

https://reddit.com/r/privacy/comments/16oxyqm/what_is_the_best_private_and_secure_email_to_use/

6. CLOUD STORAGE

Cloud storage has been criticized for unnecessarily exposing data to privacy intrusions, censorship risks, custodial issues, and rising costs. Instead of relying on centralized services, consider using decentralized or self-hosted alternatives that give you control over your data. Alternatively use a backup hard drive and skip the cloud altogether.

Stop Using: Google Drive, DropBox, Sync, One Drive, Mega

Start Using:

🔻ProtonDrive offers end-to-end encryption and zero-knowledge privacy. It provides 15 GB of free storage with the option to upgrade for more space, whilst ensuring your files remain confidential.

🔻Nord Locker is a secure cloud storage solution from NordVPN that utilizes zero-knowledge encryption, allowing only you to access your encrypted data. It offers 3 GB of free storage with the option to upgrade for additional space.

🔻Syncthing is a decentralized, open-source file synchronization tool that enables users to maintain complete control over their data. It doesn't store files on centralized servers and instead relies on direct device-to-device synchronization.

🔻Nextcloud is a self-hosted, open-source cloud storage solution that allows you to manage your own server and data. It offers features like end-to-end encryption, file versioning, and collaboration tools for secure sharing.

🔻@umbrel, as well as being a Bitcoin node, Umbrel provides a self-hosted, decentralized cloud storage service built on top of the InterPlanetary File System (IPFS). It provides users with full control over their data and enables direct device-to-device synchronization.

🔻Start9 is a self-hosted cloud storage solution that uses IPFS for decentralized file management. It's portable, low-power design makes it easy to set up and maintain your own private cloud storage server. Also a Bitcoin node.

🔻Tresorit is an encrypted, Swiss-based cloud storage service offering end-to-end encryption and zero-knowledge privacy. It provides 3 GB of free storage with the option to upgrade for additional space.

🔻Peergos is a decentralized, open-source cloud storage platform built on IPFS. It enables users to store their files in a secure, peer-to-peer network without relying on centralized servers.

Remember that no cloud storage solution can guarantee absolute privacy and security, at least not better than you can with simple encryption and a local set-up

7. NOTEBOOKS

Note-taking apps have become increasingly popular for organizing thoughts, ideas, and sensitive information. However, not all note-taking apps prioritize privacy and security to the same extent.

When evaluating notebooks, think about end-to-end encryption, zero-knowledge encryption, decentralized storage, and data ownership.

Stop Using: Evernote, Apple Notes, Microsoft OneNote, Google Keep, Simple note

Start Using:

🔻Standard Notes features include end-to-end encryption, zero-knowledge encryption, and a decentralized model where users can host their own notes on personal servers or use third-party services like Blockstack.

🔻 Simplenote is a free, open-source note-taking app that prioritizes simplicity and privacy. It doesn't collect any user data and offers offline support for taking notes when you're not connected to the internet.

🔻Bear Notes uses end-to-end encryption and doesn't store any of your content on their servers, making it a secure option for storing sensitive information.

🔻Zoho Notebook is a note-taking app that offers strong privacy features like end-to-end encryption and zero-knowledge encryption. It's available as part of the Zoho One suite or as a standalone app.

🔻Turtl is a privacy-focused note-taking app that offers end-to-end encryption, zero-knowledge encryption, and IPFS-based decentralized storage. Users can host notes on personal computers or third-party nodes for enhanced security and privacy.

🔻Joplin is a free, open-source note-taking app that prioritizes privacy and security. It offers encryption for sensitive information, offline support, and the option to sync notes with local devices or cloud services like Nextcloud, Dropbox, and ownCloud.

8. PASSWORD MANAGERS

Password managers are an improvement from not storing passwords at all, using a a notepad or relying on Silicon Valley tech giants to store on your behalf. They are also valuable in creating unique, impossible to guess passwords, that otherwise wouldn't be created. They enhance security, reduce human error, enable secure sharing, and provide easy access to online accounts, ultimately improving overall digital security.

Stop Using: LastPass, 1Password, Keeper, Google Password Manager, Samsung Pass.

Start Using:

🔻 NordPass is a closed-source password manager offering E2EE cloud syncing, multi-factor authentication (MFA), AES-256 encryption, and zero-knowledge storage. NordPass prioritizes user privacy and security with a focus on simplicity and ease-of-use.

🔻 Bitwarden is an open-source password manager that stands out for its E2EE cloud syncing, built-in MFA, data breach alerts, and AES-256 encryption. Bitwarden offers a comprehensive set of security features, making it an ideal solution for organizations and individuals concerned about privacy.

🔻 Proton_Pass is a zero-knowledge, open-source password manager emphasizing privacy and security. Proton Pass offers E2EE cloud syncing, local storage options, and AES-256 encryption for storing passwords. Its focus on user control and decentralized storage solutions make it an attractive option for those seeking maximum privacy and autonomy in their password management.

🔻 Less Pass is a simple, open-source password manager that prioritizes security by using local storage with AES encryption. LessPass does not rely on centralized servers or cloud syncing, offering a convenient and secure solution for those who prefer offline password management.

🔻 KeePass is an open-source password manager offering local storage with AES encryption and auto-type functionality. Keepass supports various plugins for added security features, making it a customizable solution for those who want more control over their password management.

🔻KeePassXC is an open-source, cross-platform password manager that offers local storage with AES-256 encryption and auto-type functionality. KeePassXC supports various plugins for added security features and has a large user base, making it a popular choice among those seeking secure password management.

Open source solutions are preferred for their ability to be audited by third parties. Cloud syncing with end-to-end encryption (E2EE) provides the convenience of accessing passwords across multiple devices while maintaining privacy.

Additional features such as built-in multi-factor authentication (MFA), data breach alerts, backup/export functions, web browser access, password generators, and support for advanced key derivative functions (KDFs) like Argon2 are important factors in evaluating password managers.

If you’re migrating from manually created passwords to a password manager. Take the opportunity to replace those passwords first, as there is a good opportunity that they are already compromised. You certainly don’t want your password listed on a compromised password database that some 12 year old can easily find and run the most basic of exploits.

Dig Deeper: https://reddit.com/r/Passwords/comments/17f73pa/i_made_a_comparison_table_to_find_the_best/

https://docs.google.com/spreadsheets/d/1b2zEEU8_YPsgo3nY1BJ72qgLXteP7Yt0_mnlYJ8m0RI/

9. OPERATING SYSTEMS

Unfortunately, many closed-source, proprietary operating systems jeopardize user privacy due to their permissioned nature, built-in Digital Rights Management (DRMs), and GPS tracking on mobile devices. Desktop and mobile OSs come with unique privacy concerns and need to be evaluated separately. Luckily, we have Linux based distros as an alternative to Windows & Mac, as well as custom ROM alternatives for Android systems using Google Pixel phones. It’s a tough ask to use less used Operating Systems for most people, but it’s good to know that there are solutions available for those who are opposed to snooping.

Stop Using: Windows, MacOS, Android, IOS.

Start Using:

Mobile:

🔻 Graphene is a hardened offers a secure and customizable experience by providing an open-source, forked version of Android. So you get the Android experience, without the interference and the bloatware. It provides our sandboxed Google Play compatibility layer:

🔻Calyx is another privacy-conscious option for Android-based devices, CalyxOS emphasizes user autonomy and privacy through its custom ROM, featuring enhanced security features and strict adherence to user privacy principles.

🔻DivestOS is a mobile OS focused on harm reduction for end-of-life devices. . It is a soft fork of LineageOS that aims to increase security and privacy.

Desktop:

🔻Tails is FOSS OS based on Debian, Tails provides a secure environment by using the Tor network for browsing the web anonymously. It can be run from a USB stick, leaving no trace on the computer when shut down.

🔻Qubes is a utilizes hardware virtualization to separate applications and data, ensuring that sensitive information remains isolated.

🔻Ubuntu / Fedora / Whonix distributions provide strong privacy features by default, such as built-in encryption, anonymous browsing capabilities, and a focus on open-source software.

As Smartphone privacy alternatives are limited to Google Pixel phones. It’s expected that most people will stick with Apple/Android. In which case, it’s advisable to use device-level encryption to secure your device at a hardware level. For example, Apple's iOS devices use FileVault encryption, while Android devices typically have AES-256 encryption. Samsung also allows full-device encryption using Knox, while Blackberry have a similar solution in SafeZone.

Dig Deeper:

https://privacytools.io/os

https://www-kuketz--blog-de.translate.goog/android-grapheneos-calyxos-und-co-unter-der-lupe-custom-roms-teil1/

https://privacyguides.org/en/mobile-phones/

https://eylenburg.github.io/android_comparison.htm

https://privsec.dev/posts/android/choosing-your-android-based-operating-system/

10. AI CHATBOTS

Large language models (LLMs) have been assisting us with all kinds of tasks from writing blogs, books and code to answering all sorts of questions we used to ask Google. But as the old saying goes, if something on the Internet is free, the real product is you (and your data). So the onus is placed on us as individuals to find AI solutions, where we are the users, not the product.

AI is fundamentally ‘a surveillance technology’

- meredith Whittaker

It's a given that people will be using Chatbots henceforth, so the challenge is to move away from the easy solution and find the privacy level that suits you.

When using chatbots, look for platforms that allow private prompt storage, E2EE support, and anonymous usage. This approach will help protect your conversations and maintain anonymity.

Stop Using: Open Ai, xAi/Grok, Shapchat, Claude, Gemini, Samsung Galaxi Ai, Google Gemini, Stable Diffusion,

Start Using: Venice.ai, HuggingChat, Start9, llama file

As far as I can tell, the most private and secure approach to running AI chatbots boils down to three options:

1⃣ Download privacy-respecting AI chatbots like Venice and Hugging Face and run them locally on a desktop or phone entirely OFFLINE. While an air-gapped environment is ideal for maximum security, it's not always necessary. Ensure the operating system is encrypted to protect local data files.

2⃣ Download llama file and run privacy-respecting AI chatbots through its platform. This approach offers E2EE for confidential conversations and data protection, ensuring no data collection or sharing occurs for advertising/analytics purposes. However, this option requires interaction with external servers.

3⃣ Run ChatGPT on a start9 server. Start9 enables decentralized storage and processing without airgapping while maintaining local privacy features. User data remains on the device or within a private network, reducing the risk of breaches and unauthorized access.

While both options provide E2EE, Start9's E2EE is limited to user interactions, whereas LLaMA File encompasses conversations with its AI models.

Comparing Options B and C, running ChatGPT on a Start9 offers more control over data processing since it happens locally on your device. If you prioritize local privacy without the need for air gapping, Start9 might be an ideal choice.

Dig Deeper:

https://hackaday.com/2023/07/30/self-hosted-chatbot-focuses-on-privacy/

https://kdnuggets.com/distribute-and-run-llms-with-llamafile-in-5-simple-steps

More info on the dangers: 1⃣https://arstechnica.com/gadgets/2024/05/microsofts-new-recall-feature-will-record-everything-you-do-on-your-pc/

2⃣https://arstechnica.com/gadgets/2024/06/report-new-apple-intelligence-ai-features-will-be-opt-in-by-default/

3⃣https://reddit.com/r/privacy/comments/1dfrojd/former_head_of_nsa_joins_openai_board/

11. VPNs

VPNs are key component of the privacy and security toolkit by preventing others from monitoring your online behavior. They create an encrypted connection between your device and a remote server, helping you access blocked content and conduct research without revealing your location.

Good VPNs don't keep logs and do cost money; free ones often collect data for advertising. VPN limitations include not protecting against malware, password theft, or complete anonymity. Your provider, partners, used sites/services, and governments may still track your online activities.

Stop Using: Hide My Ass, Express VPN , Pure VPN, Opera Free VPN, VPNSecure, VPN Master, Windscribe, Hotspot Shield VPN

Start Using:

🔻 ProtonVPN is operated by the same team behind ProtonMail, this VPN offers AES-256 encryption, DNS leak protection, and a no-logs policy for strong security. Its range of security features make it an attractive choice for those seeking privacy.

🔻NordVPN is a popular VPN provider known for its user-friendly interface and privacy features. NordVPN uses the NordLynx protocol (based on WireGuard) for faster speeds while maintaining security, along with a strict no-logs policy.

🔻 Mullvad is a popular Swedish solution that uses secure WireGuard protocol and doesn't keep any logs. Payments can be made in cash or cryptocurrencies for added anonymity.

🔻 ivpnnet is a privacy-focused VPN that doesn't collect or store any personal data on sign-up, not even email addresses. Payments can be made via cash, monero, or bitcoin for added anonymity.

Dig Deeper: https://securityplanner.consumerreports.org/tool/virtual-private-network-vpn

https://restoreprivacy.com/vpn/warning-list/

https://x.com/josephmenn/status/1437885720169836544

12. VIDEO HOSTING

YouTube is famous for censoring and cancelling content creators, raising the alarm bells about online freedom of speech and the need for privacy-respecting, censorship-resistant alternatives.

Moving away from YouTube is difficult though, as it has the largest repository of video content in the world. That said, the onus is on us to support platforms which champion privacy and/or free speech so that honest content has an outlet.

Stop Using: YouTube, Vimeo, Dailymotion, Twitch

Start Using:

🔻 BitChute is a decentralized video-sharing offering a censorship-resistant environment for content creators and viewers, making it an ideal alternative to centralised platforms.

🔻 LBRY is an open-source, peer-to-peer content distribution network that allows users to upload and share videos while maintaining control over their content. This platform doesn't rely on a centralized authority, reducing the risk of censorship.

🔻 Peertube is a decentralized video-sharing platform built on WebTorrent technology. It's an open-source project prioritising privacy and free speech. PeerTube uses a peer-to-peer model to reduce server load and provide an ad-free experience without tracking user activities.

🔻 Rumble is perhaps most recognised as a censorship free YouTube alternative. On their website, they state “we may process only minimal user data, only as much as it is absolutely necessary to maintain the website. Information collected automatically is used only to identify potential cases of abuse and establish statistical information regarding website usage”. The question remains, how much data is collected, what constitutes abuse and for how long can they resist censorship? That said, it's still better than YouTube.

Dig Deeper:

https://vdocipher.com/blog/2021/02/top-12-online-video-platforms-like-youtube-2021/#:~:text=Few%20alternate%20video%20platforms%20similar,Alternative%2C%20Vimeo%20alternative%20and%20more

14. BUYING BITCOIN

There is no disputing that Bitcoin is the most secure P2P network ever built. The on-ramps and off-ramps cannot boast the same level of assuredness, as centralized exchanges are widely recognised as a point of weakness, censorship and privacy abuse.

In contrast, P2P networks like BitTorrent, LimeWire or The Pirate Bay could never be shut down because they provide no single point of failure. P2P Bitcoin exchanges embody the same spirit and technology that underpins the torrent sites, creating marketplaces that allow people to buy and sell Bitcoin.

Stop Using: Coinbase, Kraken, Binance, Bitstamp, Revolut, OKX, Paypal,

Start Using:

🔻 Bisq is FOSS, is fully decentralized bitcoin exchange that enables P2P trading without KYC/AML checks. A self-hosted interface provides direct, anonymous transactions. It offers different types of payments, including face-to-face and cash, making it an ideal KYC-free solution.

🔻 RoboSats is a peer-to-peer, non-custodial Bitcoin exchange ideal for onboarding new users as it’s easy and quick to use. It requires no KYC since it’s based on pseudonymous avatars that allow customers to trade Bitcoin over the Lightning Network using the TOR browser only.

🔻 Vexl is non-custodial P2P mobile app without KYC/AML requirements. It provides a simple, inclusive, secure and private way to buy and sell BTC as it was intended: peer-to-peer.

🔻 Noones enables anonymous peer-to-peer bitcoin trades through an encrypted messaging system and secure payment channels. This platform eliminates intermediaries, ensuring user privacy and freedom.

🔻 Hodl Hodl connects buyers and sellers of cryptocurrency for direct P2P trading without KYC/AML checks. Users remain anonymous while securely exchanging bitcoin within a decentralized marketplace.

🔻 Peach is a decentralized marketplace unites buyers and sellers through encrypted messaging channels, eliminating intermediaries and compliance demands. Anonymity is preserved.

🔻 LocalCoinSwap is a KYC-free, peer-to-peer, non-custodial exchange that uses escrow protection for users who can buy and sell bitcoin with several payment methods, including cash in-person, cash by mail and gift cards for better anonymity.

Dig Deeper:

https://bitcoinmagazine.com/guides/how-to-buy-bitcoin-anonymously

15. DNS SERVERS

A DNS server is like a phone book that helps your computer find the address of a website you are trying to visit. Unfortunately, free DNS providers and local ISPs have removed many of the phone book's pages and track every page you turn. To solve this, you just need to find a different DNS.

Stop Using: Google Public DNS, Comcast DNS, Verizon DNS, OpenDNS and the default DNS from Local ISPs.

Start Using:

🔻 NextDNS blocks security threats, ads, and trackers while providing easy setup guides for all systems. Enjoy a free plan with up to 300,000 queries/month or upgrade for premium features.

🔻 AdGuard DNS offers ad-blocking and tracker-blocking capabilities with support for encrypted protocols like DoT and DoH. The free plan is limited to five devices.

🔻 Quad9 provides an open DNS recursive service that prioritizes security and privacy, offering a free solution for all users.

🔻 Cloudflare high-performance DNS resolver supports encrypted protocols like DoT and DoH while maintaining fast speeds and reliability.

🔻 Pie-Hole DNS is a self-hosted solution ideal for experts using Raspberry Pi or Linux-based systems. It offers powerful ad-blocking capabilities with customizable settings.

🔻 dnscrypt-proxy provides a flexible, open-source DNS proxy supporting modern encrypted protocols like DoH, DNSCrypt V2, and Anonymized DNSCrypt.

🔻 Unbound is a validating, recursive, caching DNS resolver that supports DNS-over-TLS for enhanced privacy. It's designed to be fast, lean, and secure with regular audits.

🔻 Nebula offers a light-weight, customizable, and battery-efficient DNS changer for Android devices. Perfect for those looking for a simple yet effective solution.

🔻 DNSCloak is an iOS GUI wrapper that enables encrypted DNS on iPhones and iPads by utilizing dnscrypt-proxy. It provides a user-friendly interface for managing DNS settings.

Dig Deeper:

https://recordedfuture.com/threat-intelligence-101/cyber-threat-landscape/dns-servers

https://privacytools.io/encrypted-dns

https://dnswatch.com/dns-docs/

16. SEARCH ENGINES

"Search" is overwhelmingly dominated by a small number of companies, particularly Google (90%) and Microsoft. These companies are filtering, favouring, and blocking results. Sadly many of the private search engines rely on these companies as a data source, and as such their results are filtered by default. Search Engines also track everything we search, they literally know our thoughts better than we do.

The battle here is on two fronts (privacy & censorship).

Privacy-preserving and censorship-resistant search engines provide an alternative to the Google panopticon. So it's highly recommended to protect ourselves and support these companies.

Stop Using: Google Search, Bing, Yandex, Yahoo (Bing)

Start Using:

🔻 Brave Search is a private and secure search engine that respects user privacy. Built on Brave's blockchain-based platform, it aims to provide users with accurate and relevant results while keeping data collection and tracking at bay.

🔻 DuckDuckGo doesn't track or store user data. Its focus on user privacy has made it a go-to option for those an escape from excessive tracking. DuckDuckGo has no relationship with Google, nor do they source any of our search results from Google.

🔻 MetaGer is a German-developed search engine that prioritizes user privacy through encrypted connections and anonymized search results.

🔻 Startpage is a Netherlands-based search engine that anonymizes your searches by using proxies to retrieve results from Google without storing any personal information.

🔻 Searx_engine is a decentralized, privacy-preserving search engine that allows users to access multiple search engines simultaneously. Its focus on user privacy and transparency has made it a popular choice among privacy-conscious individuals.

🔻 Mojeek is a UK-based search engine that aims to provide accurate results while respecting user privacy. It uses its own index of websites and doesn't rely on third-party data sources.

🔻 Swisscows is a Swiss based search engine that prioritizes user privacy by not storing any personal information or tracking user data.

🔻 Qwant is a France-based search engine that doesn't store user data or logs. Its decentralized approach to search ensures a more private experience for users while providing accurate and relevant results.

Dig Deeper:

https://restoreprivacy.com/private-search-engine/

https://privacytools.io/private-search

Friends don’t let friends use google products.

13. MONEY / PAYMENTS

Let's talk about money and payments. The legacy financial system provides absolutely no privacy, nor is it an equitable system. The move towards CBDCs will make it even less private and less equitable. So it's of utmost importance that we find a money system that's fair and a discreet payments system.

Stop Using: Credit/Debit cards, Stablecoins (Tether), Shitcoins, Paypal, Revolut, Venmo, Stripe, and so on.

Obviously, we cannot just exit the fiat world... but we can begin to move away on our own terms, whilst the options remain available.

Start Using:

🔻 Let's start with Bitcoin, which is the fairest system of them all, but not private, as it's built upon a public blockchain. It cannot be censored and has no kyc/aml requirement, so you can use it without doxxing yourself. It's also perhaps the only shot that we have of breaking the back of the incumbent unfair system. Everyone should own some Bitcoin.

Privacy & payments on the Bitcoin network are available on a growing number of layer two solutions (notably: eCash, Ark Protocol, The Lightning Network)

Bitcoin Layer 2:

🔻 The Lightning Network is a second-layer protocol designed to enable off-chain Bitcoin transactions, which are later settled on the Bitcoin blockchain. Lightning payments are extremely fast and quite cheap and provides privacy benefits for those who run their own nodes. Nostr Zaps are powered by the lightning network.

🔻 Ark Protocol is a layer-two solution for making off-chain Bitcoin transactions. is a payments system where people can make Bitcoin transactions at very low cost and without requiring any setup. The Ark model very closely resembles the UTXO model, which is a key differentiator with the Lightning network.

🔻 eCash

- Cashu utilises Chaumian ecash, a form of digital cash created by legendary cryptographer Dr. David Chaum in 1982. Ecash was waiting for Bitcoin as a foundational layer, which it now has. Ecash uses a mint, and is a bearer asset that can be transferred peer-to-peer, much like bitcoin. However, a key difference between ecash and bitcoin is that bitcoin exists on a ledger, whereas ecash lives on its holder’s device. Cashu is also available on the nostr network.

- Fedi is is an open-source eCash protocol for managing Bitcoin within a community. It is a system that uses a group of trusted members, called a federation, to hold and manage bitcoin for users.

🔻 Cash is a payment technology that's inevitably going to fail. Why? Society will continue to become more digitised and global, leaving little room for cash to continue. That said, we should use it while we still can, as it has the best privacy preserving properties of all. It's strong on privacy, weak on savings.

There are privacy protecting crypto alternatives like Monero & ZCash, however they have weak stores of value properties, and thus difficult to champion.

Threema got Video Messaging as well !

Which one is the most secure?

Check it for yourself:

Visit

https://www.securemessagingapps.com

Rate:

🟩=3 🟨=1 🟥=0

Results (and where the money comes from)

1. Threema = 86 = most secure Messenger (User pays one-time BTC)

2. Signal (OTF / Brian Acton / Ex-WhatsApp) = 80

3. Session (Loki Coin & suspicious Chinese) = 77

4. Wire (Janus Fries / Ex-Skype) = 68

5. SimpleX Chat *= 67

6. Wickr (Amazon) = 61

7. Element / Matrix (Amdocs / Morris Kahn) = 56

8. Apple iMessage (Hardware sales) = 37

9. WhatsApp (Meta) = 32

10. Google Messages (Ads) = 28

11. Telegram (Putin) = 27

12. Facebook Messenger (Meta) = 26

13. Microsoft Skype =10

* SimpleX Chat got 380.000 $ from VillageGlobal.vc = Jez Bezos, Mark Zuckerberg, Bill Gates, ect.

OFT = OpenTechnologyFund = US-Goverment

Nice, thanks for sharing.

V2 of this post will be improved thanks to you.