Internet Tool Box


TOPIC: Tool Box for the Internet
KEY POINTS: A list of links and ideas which you may find helpful. Feel free to forward the link to this page to your friends.
BENEFIT OF REVIEWING THIS MATERIAL: You will at least be aware of some issues, and will be able to take steps to minimize intrusions of your privacy.
How to deal with the Surveillance State (Part 1 of 2) – Jacob Appelbaum
LENGTH OF VIDEO: One Hour 17 minutes

February 28, 2018 Search better and plant a tree

Save your video files! Health Ranger to launch YouTube alternative that protects the free speech of real Americans

Hacker Uncovers FBI Use of ‘stalkerware’ which can intercept Facebook messages, track GPS, and remotely activate phone microphone

July 24, 2015 – Protect your CELLF. – removing  unwanted “spyware” from a Galaxy phone. – 4 minutes.

July 17, 2015

Edward Snowden Offers Online Privacy Tips: Drop Dropbox, Facebook And Google

March 22, 2014 Why we need the United States of Surveillance: – 2 minute Public Service Announcement

The Most Powerful, Well Connected Company You’ve Never Heard Of Is Monitoring Your Cell Phone Activity

September 8, 2013 Privacy Scandal: NSA Can Spy on Smart Phone Data

September 5, 2013 N.S.A. Foils Much Internet Encryption

July 2013: The Dead Man’s Switch is a way to automatically release information after your death. It can be used as an estate planning tool so your heirs can access your secret bitcoin stash or it can be a form of life insurance.
Below is a quote from BuzzFeed:

“As the U.S. government presses Moscow to extradite former National Security Agency contractor Edward Snowden, America’s most wanted leaker has a plan B. The former NSA systems administrator has already given encoded files containing an archive of the secrets he lifted from his old employer to several people. If anything happens to Snowden, the files will be unlocked.”

Here is a private service that will deliver a message to your designees in the event of your death:

NSA has total access via Microsoft Windows

May 2013 Bitmessage is a peer-to-peer encrypted messaging protocol that allows people to communicate anonymously.

Jitsi – Open Source Video Calls and Chat
Secure video calls, conferencing, chat, desktop sharing, file transfer, support for your favorite OS, and IM network. All this, and more, in Jitsi – the most complete and advanced open source communicator.

The Surveillance-Industrial Complex

When truth telling becomes a crime
January 1, 2013
At the 29th Chaos Communication Congress held last week in Hamburg, Germany, whistleblowers Jesselyn Radack, Thomas Drake and William Binney talked about what happened to them when they told the truth about the US Government and how they became Enemies of the State.

Encrypted on line data vault product is pretty cool

DataVault helps protect your valuable property with 250 GB of secure, off site, automatic backup services that will keep your data safe from a catastrophic loss.
Approx $25/month for better than military encryption and 250 GB of storage. Click link for $20/month pricing.

Having dropped $200 -$300 for each generation of backup drives over the past three years. And having had all three drives fail. (two just failed “because”, and the third pocket terabyte failed because I carry it around and dropped it) So I have spent about $800+ to be safe and secure and have achieved nothing, no backup data. I have just resigned the failures because I am too cheap to spend $2500 to recover the data. Yes, the data is important, but I’m betting that my opportunity cost is less than recovery cost. Hope I’m right. It is very frustrating to back things up and then find you may have to spend some large Benjamins due to a failure. Sure, drive costs have come down, but since they seem to ultimately fail, it is like being penny wise pound foolish. (unless you back up your back up….)

I am opting for an online storage. This is higher than military encryption, zero knowledge, no one can get to it, even with a subpoena. Look for Data vault at the bottom link.

Many internet marketers and companies such as Google, Facebook, and most ISP’s (Internet Service Providers) follow you around on the web by your IP address makes that impossible, so you can go anywhere you want and do anything you want without being tracked. Your sensitive web traffic is securely hidden behind different IP addresses located in multiple countries.

Alternatively a new offering has caught my attention; Unsene. Unlimited, free message to anyone, even if they aren’t on Unsene yet. Nothing to install. Military-grade security protects your important and private messages, photos and videos. Web-based, desktop, and mobile. Use anywhere you have access to the Internet.

FBI begins installation of $1 billion face recognition system across America
08 September, 2012, 00:38 Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship! Then connect to your friends for even better security!

Stratfor emails reveal secret, widespread TrapWire surveillance system Saturday, August 11th, 2012 at 8:52 am
Supporting Link:

August 21, 2012
A software engineer in my Facebook community wrote recently about his outrage that when he visited Disneyland, and went on a ride, the theme park offered him the photo of himself and his girlfriend to buy – with his credit card information already linked to it. He noted that he had never entered his name or information into anything at the theme park, or indicated that he wanted a photo, or alerted the humans at the ride to who he and his girlfriend were – so, he said, based on his professional experience, the system had to be using facial recognition technology. He had never signed an agreement allowing them to do so, and he declared that this use was illegal. He also claimed that Disney had recently shared data from facial-recognition technology with the United States military.

Google To Include Your Personal Email In Search Results

Google Fined $22.5M for Invading Privacy August 10, 2012

PDF EDITOR FREEFoxit is a leading provider of solutions for reading, editing, creating, organizing, and securing PDF documents and forms.

Watch What You Skype: Chat and User Data Now Available To Police

Ghostery™ allows you to block scripts from companies that you don’t trust, delete local shared objects, and even block images and iframes. Ghostery puts your web privacy back in your hands. Add on for your browser.

With IP Ghoster, we help to hide your computer from prying eyes and thus turn your computer into a virtual ghost that allows you to be anywhere, unrestricted and undetected. ($9.99/mo)

Citizens can hold police accountable in the palms of their hands with “Police Tape,” a smartphone application from the ACLU of New Jersey that allows people to securely and discreetly record and store interactions with police, as well as provide legal information about citizens’ rights when interacting with the police. Thanks to the generosity of app developer OpenWatch, the ACLU-NJ is providing Police Tape to the public free of charge.

14 studies that prove CCTV does not cut crime
June 14, 2012


This section is dedicated to educating the general populace about how to secure their computer from viruses, worms, breach of security, and government attempts to surveil and control you.

Our Secret (formerly Steganography) is a Windows utility that will handle the task of allowing you to hide one, or a number of files or text messages inside another file while also giving the option to password protect the data as well. Freeware.

CryptoChat 4 : A simple Crypto Chat for Skype (TM)

Disposable E-mail:
Disposable e-mail
Temporary e-mail address. Eliminates spam, use on forms where you aren’t sure if you want to join. Good for passing out an e-mail address on talkshoes, Skype chats, etc.

But why use Skype? It is easy to monitor.
Cryptocat lets you instantly set up secure conversations. It’s an open source encrypted, private alternative to other services such as Facebook chat.

Private Browsing:
Mask your IP address while browsing:
Ever want to cut and paste from a PDF but run into problems? – Good for occasional conversion, usually fails on large files and secured PDF’s.
E-mail remailer:
Anonymouth – To disguise your writing style:
Encrypt your hard drive: – check out the comments on this page to get an update on this program.
Still running old version of Word? – free conversion from docx
Who is tracking you? An add in for Firefox;
If you want to block companies from tracking you on the internet, you can install TrackerBlock for Firefox and Internet Explorer;

Burn Notice: “This message will self-destruct in three minutes, should you or any member of your IM force be captured, the Secretary will disavow any knowledge of your actions…”. If there’s one thing every kid watching spy shows dreams of, it’s exploding messages that disappear forever. The explosion is cool, but so is the idea that you can send a message to your friend without anyone else ever being able to read it afterwards.

Burn Note gives you exactly this functionality, albeit without the exploding tape or piece of paper. Write a message and send a link to your friend. They can read the message, but not easily copy it. A certain amount of time after they open the message, it is deleted forever. You can even add a password, if you want additional security.

It’s not quite as impactful as a message that literally explodes, but it gets the job done if you want to send a self destructing email without it lasting forever in someone’s inbox.

Chat Grabber:
This site will show you the chat on any Talkshoe if you have episode and chat ID.

FBI to announce new Net-wiretapping push
If you have a useful tool, post it in the reply section below.

Jun 05, 2012
Judge estimates 30K secret spying orders approved yearly

Panelists discuss ways to care for the nation’s paranoid schizophrenics, such as hiding cameras in their homes or audio transmitters in their ears (parody – The Onion)

Low-Tech Solutions To High-Tech Tyranny


NSA Obama


One thought on “Internet Tool Box

  1. Truecrypt is suspect, they have been taken off sourceforge because of their secrecy in who is coding, etc.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s