p‎ > ‎

g

The latest Edward Snowden leaks have shown that the oldest, least funded open-source technologies are still able to hold out against intrusions and exploits by the U.S. National Security Agency (NSA).

Open-source offers one major benefit over their closed-source counterparts: The code is public and available for inspection, and therefore can’t as easily include secret backdoors for surveillance.

Here are some of those (as of yet) still secure apps, services, and technologies that can keep you safe online.

Read more:

2014 in security: The biggest hacks, leaks, and data breaches

2014: The year everyone's security took a hit

Seven privacy settings you should change immediately in iOS 8

2015 security predictions: IoT attacks to join cloud breaches and ransomware

Top cybersecurity predictions of 2015

Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

Photo by: stock image

Caption by: Zack Whittaker

  • Tor (anonymous browsing)

    Tor (anonymous browsing)

    Tor, otherwise known as the “onion router,” is one of the most popular -- and undefeated -- ways to browse the Internet without leaving your activity open for prying eyes.

    Tor’s network of bouncing your traffic through multiple relays makes it nearly impossible to track a user’s identity or activity. You can access almost every website anonymously, including “.onion” addresses, which are only accessible while connected to Tor.

    Since the Snowden documents first landed, Tor usage has shot up. That’s spurred on by the fact that leaks have shown how troubled the agency is still unable to crack the network.

    Visit: Tor Project

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: Tor Project

    Caption by: Zack Whittaker

  • Mitro (password manager)

    Mitro (password manager)

    Mitro is a lightweight browser-based password manager that logs you in to your various websites automatically. It's also open-source, making it more difficult to include backdoors and flaws.

    Password managers don't just take the pain out of remembering the dozens of passwords in your life, but they protect your logins and identities by storing your various sets of credentials. No longer is it necessary to remember them, or have them written down in an insecure way. Ultimately, a password manager that’s known, and tried and tested can suffice.

    Mitro, which comes with a glowing recommendation from the Electronic Frontier Foundation privacy group, and works on a number of popular browsers, including Chrome, Firefox, and Safari.

    Visit: Mitro

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: Mitro

    Caption by: Zack Whittaker

  • PGP/GPG (encrypted email)

    PGP/GPG (encrypted email)

    Perhaps one of the biggest thorns in the side of the intelligence community: uncrackable email.

    PGP, or “Pretty Good Privacy,” first released in 1991, remains the favorite tool of tens of millions of users worldwide, thanks to its apparently uncrackable encryption. It was never particularly user friendly, though. The modern incarnation lives on as an easier-to-use software called GPG, or the Gnu Privacy Guard, which is available for Windows, Mac, Linux, and other machines.

    Although PGP now lives on with Symantec, GPG is open-source, and tried and tested by the security community. It is by far the one and only trusted secure encrypted email system. One of the benefits is that it works with your existing email address.

    Visit: Gnu Privacy Guard

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: TechRepublic

    Caption by: Zack Whittaker

  • Eraser (file shredder)

    Eraser (file shredder)

    You can't just drag a file into the trash and think it's gone forever. Most of the time, files can be "undeleted." File shredders, however, are designed to securely remove important and sensitive data from your computer for good. Eraser is one of the most highly rated file shredders available, and, thanks to it being open-source, it's free to use.

    Visit: Eraser

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: Eraser

    Caption by: Zack Whittaker

  • Ghostery (anti-tracking tool)

    Ghostery (anti-tracking tool)

    Ghostery is a tracking tool that can be added to your browser to show you how you're being tracked online -- and by whom. Available for most modern browsers for desktop and mobile, its aim is to inform users of how many companies are tracking your activities, like what sites you visit, and which companies collect data on you in order to serve you adverts. It also (at the time of writing) blocks just shy of 1,980 trackers.

    Visit: Ghostery

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: Ghostery

    Caption by: Zack Whittaker

  • AdBlock Plus (ad-blocker)

    AdBlock Plus (ad-blocker)

    As an ad-blocker, AdBlock Plus is not strictly a privacy-saving software. But by blocking ads, the browser plug-in can significantly reduce the number of tracking cookies that get installed on your computer. The software, available for most widely used modern browsers, is used by more than 50 million people. It’s also open-source, so other developers can inspect the code.

    Visit: AdBlock Plus

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: Adblock.org

    Caption by: Zack Whittaker

  • ​HotSpot Shield (virtual private network)

    ​HotSpot Shield (virtual private network)

    Hotspot Shield comes with virtual-private networking technology, allowing its users to bypass Internet provider or governmental restrictions. Many will also know it as a way of masking your country's IP address allowing you access to streaming services from other regions. But its primary goal is to allow users to securely browse the Web with end-to-end encryption in public places, which can often be prime targets for hackers and identity thieves.

    Visit: Hotspot Shield

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: CNET

    Caption by: Zack Whittaker

  • Tails OS (secure operating system)

    Tails OS (secure operating system)

    The little-known Linux-based operating system, Tails OS, rose to fame when it was given a glowing review in a name-check by whistleblower Edward Snowden.

    Tails is slated as an all-in-one solution for those who want an operating system that leaves no trace behind, as it runs from a read-only USB drive or DVD. It comes bundled with a number of technologies -- including many of those noted in this slideshow -- and state-of-the-art cryptographic tools for communication.

    Visit: Tails OS/Boum.org

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: Wikipedia Commons

    Caption by: Zack Whittaker

  • SpiderOak (cloud storage service)

    SpiderOak (cloud storage service)

    Forget OneDrive, iCloud, and Dropbox. They may all offer encrypted cloud storage, but they have the keys, and can be compelled to hand over your files to the government. But SpiderOak, a cloud storage provider, can't and won't, because its users are the ones with the encryption keys. Its entire service revolves around its customers' privacy. Not only is it secure and private, it offers much of the same functionality as the mainstream providers.

    Visit: SpiderOak

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: SpiderOak

    Caption by: Zack Whittaker

  • OpenDNS (browsing protections)

    OpenDNS (browsing protections)

    By switching your DNS settings, OpenDNS aims to make the internet safer and more reliable, while at the same time improving your internet speeds and connection's reliability. OpenDNS aims to offer malware and botnet protection, and Web filtering to home users. This can help prevent gaining access to sites that are honeypots for hackers, or might put users at risk. And best of all, it's free.

    Visit: OpenDNS

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: OpenDNS

    Caption by: Zack Whittaker

  • Off-the-Record (Instant messaging plug-in)

    Off-the-Record (Instant messaging plug-in)

    Started out as a university research project, Off-the-Record messaging has become one of the most useful (and secure) ways of sending instant messages without having to worry about covert surveillance.

    The software is widely considered as one of, if not the best tools out there -- so much so, other encryption-based software have included the code as part of their own projects.

    The open-source software plugs in to common instant messaging software, including Adium, Cryptocat, and Pidgin -- among others. It’s free, and open-source, and tried and tested by the community as one of the most trusted ways of chatting online.

    Visit: Off-the-Record Messaging

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: Cyberpunks

    Caption by: Zack Whittaker

  • Silent Circle (encrypted voice calls)

    Silent Circle (encrypted voice calls)

    Silent Circle, which last year canceled its upcoming encrypted email service as to avoid being forced to hand over data to the government, invented Silent Phone. The encrypted voice calling service works on existing cellular networks. It’s not free, but it’s low-cost and has been widely lauded by privacy experts alike.

    The company also received more than $30 million in funding towards its Blackphone design, an all-inclusive mobile device that aims to be surveillance-proof.

    Visit: Silent Circle

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: CNET

    Caption by: Zack Whittaker

  • HTTPS Everywhere (secure-site switcher)

    HTTPS Everywhere (secure-site switcher)

    Created by the Tor Project and the Electronic Frontier Foundation (EFF), the HTTPS Everywhere plug-in aims to force your browser into loading the secure version of a site over a page that doesn’t contain a security certificate. This makes browsing more secure by encrypting everything from your computer to their server, and vice-versa.

    The plug-in, designed for Chrome, Firefox, and Opera, is also available for Firefox for Android.

    Visit: Electronic Frontier Foundation

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: stock image

    Caption by: Zack Whittaker

  • DuckDuckGo (search engine)

    DuckDuckGo (search engine)

    Google’s business model revolves around serving ads against the user. The better the data, the better the ads. The better the ads, the more money it makes.

    But not all search engines are like that. DuckDuckGo, which was recently added to Apple’s iOS 8 software, does not store your data or send your search terms to other sites. Every user gets the same results. It’s the first privacy-conscious search engine of our time.

    Visit: DuckDuckGo

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Photo by: CNET

    Caption by: Zack Whittaker

    • Often, open-source software is the most secure
    • Tor (anonymous browsing)
    • Mitro (password manager)
    • PGP/GPG (encrypted email)
    • Eraser (file shredder)
    • Ghostery (anti-tracking tool)
    • AdBlock Plus (ad-blocker)
    • ​HotSpot Shield (virtual private network)
    • Tails OS (secure operating system)
    • SpiderOak (cloud storage service)
    • OpenDNS (browsing protections)
    • Off-the-Record (Instant messaging plug-in)
    • Silent Circle (encrypted voice calls)
    • HTTPS Everywhere (secure-site switcher)
    • DuckDuckGo (search engine)
    1 of 15 NEXT PREV

    14 privacy tools you should use to stay secure

    From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.

    Read More Read Less

    Often, open-source software is the most secure

    The latest Edward Snowden leaks have shown that the oldest, least funded open-source technologies are still able to hold out against intrusions and exploits by the U.S. National Security Agency (NSA).

    Open-source offers one major benefit over their closed-source counterparts: The code is public and available for inspection, and therefore can’t as easily include secret backdoors for surveillance.

    Here are some of those (as of yet) still secure apps, services, and technologies that can keep you safe online.

    Read more:

    2014 in security: The biggest hacks, leaks, and data breaches

    2014: The year everyone's security took a hit

    Seven privacy settings you should change immediately in iOS 8

    2015 security predictions: IoT attacks to join cloud breaches and ransomware

    Top cybersecurity predictions of 2015

    Published: May 21, 2015 -- 15:45 GMT (08:45 PDT)

    Caption by: Zack Whittaker

    Join Discussion

    Powered by Livefyre

    Add your Comment

    Related Galleries

    • How to control what data your Android apps transmit

      Google

      How to control what data your Android apps transmit

    • The reasons why you should hide your IP address

      Security

      The reasons why you should hide your IP address

    • How to lock up your digital life and privacy in an hour (in pictures)

      Security

      How to lock up your digital life and privacy in an hour (in pictures)

    • Every Trump White House tech fail so far

      Security

      Every Trump White House tech fail so far

    #auto

    Subpages (9): 7 9 d g h l t v y
    Comments