Technology

- Technology and Successful Activism -

To be successful as an activist movement, we have to protect our privacy and communications from our adversaries and detractors whether they be corrupt governments and their agencies, or the shadow Caliphate and their agencies. The following are suggestions to learn about internet privacy and to implement it in your lifestyle.


- Learn about Internet Privacy -

Some suggested books and blogs about internet security

Dragnet Nation This book offers a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. It provides practical solutions to protect our privacy.

ExpressVPN Blog The surveillance state is here, watching your every move online and your every move in the real world. It is not unthinkable to go completely dark online, but how do we move in the real world without being seen?

Betanews Security provides well-written articles about security and the latest technology issues and developments. Keep abreast on news relating to Microsoft, Windows, Apple, Linux, Android, Cloud, security and reviews. Be sure to check out their Linux page.

- Secure Operating Systems and Applications -

Move from insecure to secure operating systems and applications

Linux Mint   It is a well know fact that the Windows and Mac operating systems are open to spyware and malware. Migrate to a secure Linux operating system such as Linux Mint. Other flavours of Linux can be found here.

ExpressVPN is a Virtual Private Network which is a secure tunnel between two or more devices. VPNs are used to protect private web traffic from snooping, interference, and censorship.

ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features. Their goal is to build an internet that respects privacy and is secure against cyberattacks.

WARNING:  Protect your privacy!  Never use the Google search engine!  Avoid anything Google.  Use the DuckDuckGo search engine instead!  DuckDuckGo can be easily added to your browser.

- Secure and Uncensored Social Networking -

Communicating effectively in a surveillance world

Minds is a free and open source social networking platform that rewards you for your activity online with revenue, digital currency and more views on your content. Minds is built on a foundation of freedom, privacy and democratization. We believe it will soon overtake and replace the censored Facebook platform.

BitChute  is a video hosting service that uses peer-to-peer technology. Consider hosting and/or backing up your videos on the free and uncensored BitChute. In this way you avoid censorship and demonetisation by established services like YouTube.

Gab is an ad-free social network for creators who believe in free speech, individual liberty, and the free flow of information online. Why use Twitter who censors and suppresses opposing views, information, and better ideas when you can communicate, find information, network, and discover news with Gab?

HookTube  Previously censored YouTube videos can be viewed at HookTube. Also, share YouTube videos without giving them views. Bypass country blocks and age restrictions. Download YouTube videos and music. Keep your data private from the Goolag.

Slack is a platform that connects teams with the apps, services, and resources they need to get work done. Slack is the fastest growing business application in history. Millions of people around the world use Slack to bring their teams together, make sense of their work, and drive their business forward.

alternativeTo is a website which lists alternatives to web-based software, desktop computer software, and mobile apps, and sorts the alternatives by various criteria. Look there for software that respects your privacy, security and freedom.

- Secure Hardware -

Secure hardware. Some available and some in the development stages

Librem are the first high-end laptops where you are in control and have complete visibility into the operating system, all bundled software, and the deeper levels of your computer.

Typical laptops use hardware chips coupled with software that can betray you (including tracking you without your consent). News stories have shown how these chips can surreptitiously transmit voice, networking, picture or video signals. Other chips are used to install spyware, malware or viruses. These built-in vulnerabilities can turn "your" computer into "their" computer.

Librem 5 the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers.

This web page is dedicated to our favorite autocratic monopoly and spy agency, Goolag.