<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Failsafe</title>
    <link>https://failsafe.writeas.com/</link>
    <description>I just think privacy is neat.</description>
    <pubDate>Sun, 05 Apr 2026 14:17:45 +0000</pubDate>
    <item>
      <title>How to Encrypt EVERYTHING</title>
      <link>https://failsafe.writeas.com/how-to-encrypt-everything?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Hello, friends! In the spirit of the EARN IT act seemingly gathering steam in the USA, I&#39;ve written a detailed guide on how to encypt, well... everything. Welcome to a lengthy blog post overstuffed with hot, sticky, sweet and sour cryptography. Bon appétit.!--more-- &#xA;&#xA;I will be attempting to update this post somewhat regularly, so check back from time to time! I&#39;ll be sure to make it known when I&#39;ve updated.&#xA;&#xA;As always, I welcome your input--if you agree, disagree, have additions, have questions--please speak up! Feel free to reach out to me on Social Media or by Email (details at bottom of post). Let&#39;s talk and learn from each other. I&#39;ll try my best to respond as much as I can, even if it takes me a little bit of time to do so. :)&#xA;&#xA;----&#xA;&#xA;UPDATED 11/01/2020 (See Changes)&#xA;----&#xA;&#xA;Contents&#xA;Encrypting Web Traffic&#xA;    VPN&#xA;    Tor&#xA;        VPN + Tor?&#xA;    DNS Requests&#xA;Encrypting Communications&#xA;    SMS/MMS and Voice Calls&#xA;    Email&#xA;    Private Messaging, VoIP, and/or Video Chat&#xA;Encrypting Synced Data&#xA;    All-in-One Solution&#xA;    Passwords&#xA;    2FA/MFA/OTP&#xA;    Contacts &amp; Calendar Sync&#xA;    Personal Notes / Journals&#xA;    Documents&#xA;    Cloud Storage&#xA;Encrypting Collaborative Projects &amp; File Sharing&#xA;    Communication for Teams&#xA;    Shared Documents&#xA;    File Sharing&#xA;Encrypting Your Files&#xA;    Encrypting System Drives&#xA;        Android&#xA;        iOS&#xA;        Linux&#xA;        Mac&#xA;        Windows 10&#xA;    Encrypting Flash Drives / External Drives&#xA;    Encrypted Folders / Partitions&#xA;Hiding Files and Secret Messages in Plain Sight with Steganography (Coming soon!)&#xA;Contact Me&#xA;&#xA;----&#xA;&#xA;a name=&#34;web&#34;Encrypting Web Traffic/a&#xA;&#xA;There are currently two excellent, reliable ways to encrypt your web traffic that are widely used: a VPN and TOR. Let&#39;s talk about both. I will also touch on DNS encryption at the end of the section.&#xA;&#xA;VPN&#xA;&#xA;VPN stands for Virtual Private Network, and a good, trustworthy VPN is an indespensible tool in the fight for privacy. A VPN will generally allow you access a collection of servers across multiple countries and continents. You may have seen people using VPNs to access Netflix or YouTube content from different regions, which is definitely a nice perk, but not why I&#39;m bringing them up. &#xA;&#xA;When you connect to a website, your IP address is logged. We could dive deeper into why this might be problematic, but if you&#39;re reading this, I&#39;m assuming you&#39;ve already got some semblance of an idea. In very short terms, that IP can be used to track you around the web, from site to site, mostly for marketing purposes (and potentially reasons more sinister). A VPN worth its salt will encrypt your request to connect to a site and any other data you may be uploading, then ferry it safely to a remote server before decrypting it and directing it where it&#39;s meant to go. The beauty of this is twofold: &#xA;&#xA;Your true IP address will not be revealed to the sites you visit, as it will only see the remote server&#39;s IP, from which hundreds or thousands of varying connections are made daily, effectively obscuring your identity and habits online.&#xA;Your ISP (Comcast, TWC, Century Link, AT&amp;T, Verizon, etc.) will only see your encrypted traffic headed to a single remote server, and not where it goes after. Essentially, they have no idea what you&#39;re doing on the web, either. &#xA;&#xA;This is not a foolproof method of achieving anonymity, however. Why? Because your VPN can see your true IP and exactly what you&#39;re doing with it. This is where things get tricky, and why it&#39;s so crucial to use a reputable VPN service. &#xA;&#xA;I can make a few recommendations on VPNs I&#39;ve found worthy of my own trust, but first I want to detail a couple of the important facors that I look for in a VPN:&#xA;&#xA;Loglessness. There&#39;s nothing from stopping a VPN service from claiming to be logless and collecting logs anyway, so there is absolutely an element of trust needed here. My personal view is that for any privacy strategy to work, you are going to have to need to be able to place trust in certain organizations and tools--it&#39;s inevitable. We just have to do our homework and practice with failsafes/redundancy when we can. &#xA;Jurisdiction. In general, I am skeptical of VPNs based in the USA or China, as their privacy laws are less than stellar. A VPN based somewhere like Switzerland, however, would be subject to their remarkably forward-thinking privacy laws. Depending on your own unique use-case, you may want to consider where your VPN provider is headquartered. In researching this, you may see terms like &#34;Five Eyes,&#34; &#34;Nine Eyes,&#34; or &#34;Fourteen Eyes&#34; come up. This is a detailed subject, so I recommend skimming this article to get a better idea of what this means for you. &#xA;Leak Protection. Ideally, the VPN service will have a mitigation in place for DNS Leaks.&#xA;Security. Arguably the most important aspect, the VPN provider needs to offer strong encryption protocols (ideally AES-128 or AES-256, avoid blowfish or anything below 128-bit encryption).&#xA;Monetization. VPN services are expensive operations to run, and as such, any VPN that is provided at no charge should draw immense skepticism. You must consider how they monetize their service to properly evaluate if it will be an asset to your privacy.&#xA;&#xA;Luckily, comparing all of these traits and more has been made extricably easy by That One Privacy Guy through the detailed VPN comparison chart on his site, aptly named That One Privacy Site. Use this resource, please.&#xA;&#xA;My Recommendations: I personally feel comfortable using and recommending Mullvad, Proton VPN, Nord VPN, or Mozilla VPN (which piggybacks on Mullvad&#39;s servers). &#xA;&#xA;  A Note on PIA: I was a Private Internet Access user for a long time, but many are unaware that they were recently purchased by Kape Technologies, a less-than-reputable PLC that, at one time, created adware and has since rebranded as a &#34;cybersecurity&#34; company. I am not aware of any major changes to their policies since the acquisition, so they may still be a fine service, but the purchase was a major red flag for me and I can no longer comfortably recommend the service. &#xA;&#xA;You can host your own VPN at no cost, but this is only recommended if you have the knowledge and means to do so properly, for your own security.&#xA;&#xA;Tor&#xA;&#xA;Tor differs from a VPN in a few key ways. Tor is The Onion Routing network, and it is a free global network of nodes that can only be accessed via the Tor Browser that runs on donations. When you connect, your web activity is encrypted and routed through a series of 3 random nodes BEFORE it makes a connection. While you can use the Tor browser to access &#34;Clearnet&#34; (or &#34;normal&#34;) websites, it also offers the ability to visit Onion sites. These are sites accessible only via the Tor network and provide an additional layer of protection.&#xA;&#xA;Both Tor and VPNs are exceptional tools for privacy, and while there&#39;s a bit of overlap, they both have unique strenths that will make them each better suited for different use-cases. Here is a more technical breakdown to help decide if a VPN or Tor is better for you.&#xA;&#xA;For more information on using Tor, see my recent post on How to Get The Most Out of Tor in 2020. &#xA;&#xA;VPN + Tor?&#xA;&#xA;So if VPNs are good, and Tor is also good, wouldn&#39;t they be better together? This is where things get a little messy, because it depends on who you ask. Many very knowledgable folks make the argument that using a VPN with Tor can compromise your anonymity. I personally subscribe to the idea that using Tor over a VPN (not the other way around) can significantly improve your anonymity, and here is my reasoning:&#xA;&#xA;Your ISP can see you&#39;re using Tor, so going VPN   Tor means that your ISP won&#39;t know you&#39;re using the Tor network.&#xA;As far as data transfer, your packets will go VPN server   Tor Node #1   Tor Node #2   Tor Node #3   Target Site, so whether or not you use a VPN, the site you&#39;re connecting to is only gonna see the IP of the Tor exit node, not the VPN server&#39;s IP.&#xA;The entry node will see your IP, but it sees your real IP, anyway. Using a VPN can hide your IP from the entry node, but this requres that you have a trustworthy VPN provider that is truly logless, and that you pay for the service by reasonably anonymous means.&#xA;&#xA;As far as I can tell, if done right, the only downside would be a terribly slow connection (VPNs and Tor will both take a hit on your connection speeds). Since there are some valid arguments for both sides of this old, rusty coin, I will not give you a definitive answer on whether it&#39;s right for you. Luckily, a community-managed wiki for The Tor Project has created an excellent post on this subject, so I highly recommend giving it a read.&#xA;&#xA;If you have any thoughts on this, please let me know. Let&#39;s discuss! I&#39;m here to learn, too.&#xA;&#xA;DNS Requests&#xA;&#xA;A Domain Name System (or DNS) server works much like an old school phone operator. When you type reddit.com into your browser, you are calling in to say, &#34;Hello, I would like to be connected to my old pal, Reddit.&#34; The operator will then find the phone number (or IP Address) of Reddit and help direct the connection. If you had no idea what a DNS server was, you are most likely using the DNS provided by your ISP. Many may also be using Google&#39;s DNS option, as it&#39;s quick and reliable. In both cases, your DNS requests (or the sites you are trying to visit) are unencrypted and logged by a third-party. Much like a VPN, it is possible to host your own private DNS server. This is a great option if you have the know-how and the resources to set it up properly, but it won&#39;t hardly be the most accessible option for many. &#xA;&#xA;For those that use a VPN, many VPN providers include their own secure DNS. This is great! This means you don&#39;t have to do anything special while the VPN is running. If your provider offers DNS leak protection, please note that it is not recommended that you try to use DNS over TLS or DNS over HTTPS, as it can invalidate the protection.&#xA;&#xA;If you are not using a VPN with an included DNS or are still in need of a quick and easy solution, there are lots of DNS choices out there, so I&#39;ve narrowed them down to a few that I have found to be reputable enough. You&#39;ll want to make sure that the provider you choose is equipped with DNSSEC and supports some kind of encrypted tunneling protocol, such as DoT (DNS over TLS) or even better, DNSCrypt (see below chart for more info). &#xA;&#xA;| Provider | Location | Logging | DNSSEC |&#xA;|:-------|:-------|:-------|:-------|&#xA;| Quad9  | USA  | Minimal  | Yes  |&#xA;| DNS.WATCH  | Germany  | None  | Yes  |&#xA;| Snopyta  | Finland  | None  | Yes  |&#xA;| Cloudflare\  | USA  | Minimal  | Yes  |&#xA;  \Please note:* Cloudflare claims that their logging is extremely minimal. Regardless, many users around the internet do not trust them as an organization. I have been unable to find enough evidence to make a truly informed recommendation regarding Cloudflare&#39;s reputability, but I am including them because, at this time, they at least appear to be committed to offering a private, secure alternative DNS. They are also the fastest DNS out there by a notable margin. I personally would opt for another choice--such as Quad9--in the interest of privacy, but I did want to include this one as a more private alternative to Google DNS for the performance freaks.&#xA;&#xA;You can find a much more comprehensive comparison chart with more options where I borrowed some of this information from, on PrivacyTools.io. As mentioned above, DNSCrypt is highly recommended. To use it, you need only download a client from their website and run it. In the client, you can typically select from numerous supported DNS options, but while they are all secure options, not all of them are necessarily the most private options. This is why it&#39;s important to look over the supported choices on sites like PrivacyTools and go in knowing what you&#39;re using. &#xA;&#xA;If you choose not to--or are unable to--use the DNSCrypt client on your chosen device, here is a quick and dirty guide to change your DNS server on any device courtesy of HowToGeek.&#xA;&#xA;----&#xA;&#xA;Encrypting Communicationsa name=&#34;comms&#34;/a&#xA;&#xA;For some, like journalists and whistleblowers, encrypted communications are vital to their work--and in some areas, their survival. For others, we simply don&#39;t want our private messages parsed for marketing data. Both cases are completely valid. I firmly believe that everyone has a use for legitimately private communication and that it should be easily obtainable. As of today, fortunately, it is for many of us. &#xA;&#xA;Here are some recommendations for a mix of paid services and FOSS (free and open source software) for communication that provide E2EE (end-to-end encryption). What this means is that all communications are fully encrypted on your device (&#34;clientside&#34;) and decrypted only upon arriving at the receiver&#39;s device. E2EE exists to promise the user a zero-knowledge service, meaning that even the company themselves cannot read your messages, nor could any government-based or malicious actors that compromise their servers. They can only be deciphered on your physical device.&#xA;&#xA;  \Please note that for all of the following, the other user must use the same tool in order to get the most protection from them.&#xA;&#xA;SMS/MMS and Voice Calls&#xA;&#xA;Signal (Android/iOS/Linux/Mac/Windows) [FOSS] - An SMS application by Open Whisper Systems that can handle both plain, unencrypted text messages with anyone AND E2EE text messages with other Signal users (for mobile users--on PC, it will only allow private messaging between other Signal users). It is endorsed by Edward Snowden himself and widely used in both private and public sector by cybersecurity professionals and government officials alike. There are alternatives and forks out there, but they are not cross-compatible with Signal. Some prefer alternatives, as Signal does require a phone number on sign up, but since Signal dominates this particular niche, you&#39;re going to find way more people are already using this one, so it&#39;s easily my preferred recommendation. Signal is also capable of E2EE voice and video calls. I&#39;m often surprised at how many of my friends and contacts are already using Signal once we swap numbers.&#xA;MySudo (Android/iOS) [PAID] - MySudo is a closed-source service by Anonyome Labs that allows users to create multiple &#34;Sudos&#34; or alternate identities, each with their own phone number and email address. All texts, calls, and emails between other MySudo users are free and E2EE, but you need to pay for a subscription service to take advantage of the full suite of tools. Theoretically, one could have a Sudo for personal matters, a Sudo for work, and a Sudo for finance. Let&#39;s say they leave a job or their work phone number becomes otherwise compromised--they could simply kill that number and get a new Sudo. Some users will even go so far as to never give out their actual cell number, and instead rely only on Sudo numbers. This can be a very practical way to compartmentalize your life and conceal one of your most sought-after digital assets. In my experience with it, the numbers are often rejected by businesses and online retailers that demand a phone number, but it&#39;s excellent for Craigslist dealing and many other situations.&#xA;&#xA;Email&#xA;&#xA;Protonmail (Android/iOS/Linux/Mac/Windows/Web) FOSS/PAID] - ProtonMail is a Swiss-based, open source email service with an incredible dedication to privacy, security, and zero-knowledge. They take security so seriously, in fact, that their datacenter is located in a underground in a guarded bunker beneath 1,000 meters of solid stone. I shit you not, they are Bond-villain-level committed. You can [read more about their security features here, including offerings such as self-destructing messages. They also have an onion address and can therefore be accessed securely via the Tor network. ProtonMail is handily the service that I feel most comfortable recommending out of anything else in this guide. &#xA;Tutanota (Android/iOS/Linux/Mac/Windows/Web) [FOSS/PAID] - ProtonMail is a tough act to follow, but Tutanota manages to be a serious contender as another open source, privacy-conscious email provider. If for any reason you opt not to go with ProtonMail, Tutanota is a swell alternative.&#xA;  Bonus Tip:&#xA;&#xA;  If you are communicating with another individual that is not also using your same secure email provider, you can still use PGP encryption to secure your communications. Here&#39;s a great guide to getting started with PGP in Mozilla Thunderbird, which should work with almost any email provider. If you opt to use ProtonMail, they also allow you to send PGP encrypted emails very easily, right in the web browser! Here is their guide for PGP with non-ProtonMail users. &#xA;&#xA;Private Messaging, VoIP, and/or Video Chat&#xA;&#xA;Wire (Android/iOS/Linux/Mac/Windows/Web) [FOSS] - Wire is an open source, Swiss-based tool for private messaging, video chat, and voice chat. You can easily create group chats, perform screen sharing, send GIFs, and more. Of course, all communication in the app is E2EE. It&#39;s my preferred alternative to Skype, Teams, and other similar tools. In my personal experience, it has also performed better and provided more stability across all platforms than some of the more commercial offerings. It&#39;s a brilliant piece of software and I highly recommend it. &#xA;Briar (Android) [FOSS] - Briar is a unique messenger for two reasons: it offers more than just messaging with blogs, forums, and groups; it also has the ability to connect to nearby users without an internet connection. It is the only messenger I know of that will allow you to send messages locally over Bluetooth, which could be handy in a number of scenarios. For the Tor users, it also give you the option to connect over the Tor network, which is a huge perk. At the time of writing, it is only available for Android.&#xA;Mumble (Linux/Mac/Windows/Web) [FOSS] - Mumble is an open source alternative to Discord. It&#39;s a low-latency messenger and audio chat program built for gamers. I haven&#39;t used this one much, but my experiences have been good, if only brief. &#xA;Pidgin + OTR (XMPP) (Tails) FOSS] - If you are using the [Tails live operating system, Pidgin is a great Tor-friendly messenger option, pre-installed and configured out of the box for you. Here is a video with a detailed guide on getting this set up. Snopyta offers a solid private XMPP server that you can use over Tor, but you can also always look to Calyx Institute or RiseUp, among others.&#xA;Rocket.Chat (Android/iOS/Linux/Mac/Windows/Web) [FOSS] - Simply put, this is a free, open source, self-hostable replacement for Slack and other team-based collaborative chat platforms. All communication is E2EE. This platform comes highly recommended for companies, online communities, collaborations, or even just a friendly group chat. &#xA;Jitsi Meet (Android/iOS/Linux/Mac/Windows/Web) [FOSS] - Jitsi Meet is an open source tool for video conferencing. It works similarly to Zoom, but performs better and offers a significantly more private and secure experience. If you use Zoom for work, I do recommend looking into whether you could get others on board with switching.&#xA;&#xA;----&#xA;&#xA;Encrypting Synced Dataa name=&#34;sync&#34;/a&#xA;&#xA;We sync a lot of data with the cloud. Like, a lot a lot. Contacts, calendars, notes, photos, etc. These details could be particularly sensitive, as they are quite personal. This information is regularly collected by many of the apps you have on your phone--and by your phone&#39;s own operating system--to generate a targeted-marketing profile on you. They&#39;re also generally stored unencrypted, making them vulnerable to malicious actors who manage to compromise your device or a network to which you&#39;re connected. Luckily, we can fix this.&#xA;&#xA;All-in-One Solution&#xA;&#xA;NextCloud (Android/iOS/Linux/Mac/Windows/Web) FOSS] - You can think of Nextcloud like having your own personal Dropbox or OneDrive. It can sync files, calendar, contacts, notes, and more between a myriad of devices. It even has plug-ins available that expand functionality, and you can even use it for secure video calling. This is a reasonably elegant solution, and it pairs well with Cryptomator for an additional layer of security. There is a cost to this option, however: this is a service that must be hosted. This means you will either need a private server of your own to host it on, or you will need to pay a web-hosting provider to borrow space on their servers. If this is not teneble for you, please check out the individual services below. If you&#39;re looking to rent a server, there are many, many reputable VPS solutions out there--but I like to recommend [wölkli.&#xA;&#xA;Syncthing (Android/Linux/Mac/Windows/More) [Foss] - This is a tool that will allow for seamless, continuous background syncing of files, folders, and directories between multiple devices. There is no central &#34;cloud&#34; server here, so your data is transfered securely between only your own devices. &#xA;&#xA;Passwords&#xA;&#xA;Bitwarden (Android/iOS/Linux/Mac/Windows/Firefox/Chromium/Web) [FOSS/Paid] - Bitwarden is among the very few &#34;online&#34; password managers that I feel comfortable recommending. One major reason is that it can be self-hosted, if you have the means. If not, I still feel Bitwarden is the best password manager with syncing capability. It&#39;s convenient, it has all the bells and whistles you might want (such as auto-fill), and it&#39;s a zero-knowledge, open source solution from a reputable company. It&#39;s every bit as secure as those syncing their KeePassXC databases with Cryptomator, but significantly easier to manage.&#xA;&#xA;2FA/MFA/OTP&#xA;&#xA;Authy (Android/iOS/Chromium) [Free] - 2FA is one of the best things you can do for your own security, and Authy makes it pretty simple. Some will be concerned that Authy is not open source, and some will take issue with the fact that your 2FA codes sync with their servers. These are absolutely valid concerns, and for you, there are great options like AndOTP (Android) or KeePassXC (Multi-platform) out there; however, these apps won&#39;t sync your access tokens and you are responsible for manually creating your own backups. In my own personal research, I feel comfortable recommending Authy, particularly to those that are apt not to use 2FA due to the inconvenience, as Authy is about as convenient as 2FA gets and it is nearly always better to use 2FA than not. Authy is zero-knowledge and will sync your keys in an encrypted state. By default, Authy can only be used on a single device for your security, but you can opt to sync between multiple devices with a simple toggle in the app settings. If anything ever happens to your device, your access tokens will be backed up securely and automatically, so you don&#39;t have to worry about being locked out of an account--just don&#39;t forget your backup password.&#xA;&#xA;Contacts &amp; Calendar Sync&#xA;&#xA;Etesync (Android/iOS/Linux/Mac/Web) FOSS/PAID] - Etesync is an open source, zero knowledge tool for transparently syncing your contacts and calendars in the background. It&#39;s based on DAVDroid, but with some much-needed security enhancements. The syncing itself is encrypted, and then the data is stored in an encrypted state locally. The best part is that you can use any Calendar or Contact apps you like--even the stock ones--and while your data will be displayed in those clients, they cannot actually parse the data. See the [FAQ for more information. It&#39;s also worth noting that they have recently added note syncing capability, and it is possible to host your own Etesync instance.&#xA;&#xA;Personal Notes / Journal&#xA;&#xA;Joplin (Android/iOS/Linux/Mac/Windows) [FOSS] - Joplin is a multi-platform note taking solution with markdown support and multiple ways to organize notes. It can be synced securely with your Nextcloud server, via WebDAV, or other cloud storage services. It&#39;s the most feature-rich option in this list, as well, and it&#39;s completely free and open source.&#xA;Etesync Notes (Android/iOS) [FOSS/Paid] - Still in beta, this is a newly-released alternative to Joplin that syncs directly to your Etesync account. I have not tested it thoroughly, but I can say with certainty that it&#39;s a project worth keeping an eye on, at least.&#xA;Standard Notes (Android/iOS/Linux/Mac/Windows) [FOSS/Paid] - This app is open source, but some of the more premium features are locked behind a paywall. For this reason, it&#39;s not my app of choice while robust options like Joplin are freely available, but it does offer a slightly different approach and a more elegant interface that many are sure to appreciate. &#xA;Turtl (Android/Linux/Mac/Windows) [FOSS] - I know people who swear by this app. I really wanted to love it, but I have always found this one a bit of a struggle to use, in my personal experience. That said, it is an excellent, highly secure option if it works for you!&#xA;&#xA;Documents&#xA;&#xA;CryptPad (Web) [FOSS] - The web editors are based on OnlyOffice, my preferred Office suite. I find that it&#39;s really easy to edit in the web browser, but it&#39;s also quite simple to move local files to the cloud and vice versa. &#xA;&#xA;Cloud Storage&#xA;&#xA;Cryptomator (Android/iOS/Linux/Mac/Windows) FOSS] - Cryptomator allows you to quickly and easily create an encrypted folder on your local machine. This folder can be synced with any cloud service (NextCloud, OneDrive, Dropbox, etc.) to secure your files and prevent even &#34;big data&#34; cloud providers like Google or Microsoft from knowing what it is that you&#39;re storing. This is my own recommendation, but there are alternatives that appear solid, like [CryFS. &#xA;&#xA;Cryptee (Android/iOS/Linux/Mac/Windows/Chrome OS) [FOSS/Paid] - Cryptee is a cloud service for storing photos, documents, and other personal data. A meager 100 MB of storage space is offered at no cost, but there are paid plans available up to nearly 2 TB. This is an excellent alternative to Google Photos/Drive and similar such cloud storager offerings.&#xA;&#xA;----&#xA;&#xA;Encrypting Collaborative Projects &amp; File Sharinga name=&#34;share&#34;/a&#xA;&#xA;Communication for Teams&#xA;&#xA;Rocket.Chat (Android/iOS/Linux/Mac/Windows/Web) [FOSS] - Simply put, this is a free, open source, self-hostable replacement for Slack and other team-based collaborative chat platforms. All communication is E2EE. This platform comes highly recommended for companies, online communities, collaborations, or even just a friendly group chat. &#xA;Jitsi Meet (Android/iOS/Linux/Mac/Windows/Web) [FOSS] - Jitsi Meet is an open source tool for video conferencing. It works similarly to Zoom, but performs better and offers a significantly more private and secure experience. If you use Zoom for work, I do recommend looking into whether you could get others on board with switching.&#xA;Wire Pro/Enterprise (Android/iOS/Linux/Mac/Windows/Web) [FOSS] - Wire is an open source, Swiss-based tool for private messaging, video chat, and voice chat. You can easily create group chats, perform screen sharing, send GIFs, and more. Of course, all communication in the app is E2EE. It&#39;s my preferred alternative to Skype, Teams, and other similar tools. In my personal experience, it has also performed better and provided more stability across all platforms than some of the more commercial offerings. It&#39;s a brilliant piece of software and I highly recommend it. &#xA;&#xA;Shared Documents&#xA;&#xA;CryptPad (Web) [FOSS] - The web editors are based on OnlyOffice, my preferred Office suite. I find that it&#39;s really easy to edit in the web browser, but it&#39;s also quite simple to move local files to the cloud and vice versa. This suite of tools includes the ability to share documents between teams, with real-time updating and editing capability.&#xA;&#xA;File Sharing&#xA;&#xA;Onion Share (Linux/Mac/Windows) [FOSS] - Onion Share uses the Tor network to securely and anonymously share files of any size. The other party does not even need to have Onion Share, as long as they have the Tor browser. &#xA;SwissTransfer (Web) [Free] - Temporary file transfer solution for files up to 50 GB. Free and does not require registration. The service is based in Switzerland, so it is protected by Swiss privacy laws. &#xA;Blackhole (Mac/Windows) [FOSS] - BlackHole is a blockchain-based file sharing protocol. &#xA;&#xA;----&#xA;&#xA;Encrypting Your Filesa name=&#34;files&#34;/a&#xA;&#xA;System Drives&#xA;&#xA;Android&#xA;&#xA;See here.&#xA;&#xA;iOS&#xA;&#xA;See here.&#xA;&#xA;Linux&#xA;&#xA;See here. &#xA;&#xA;Note that you can also opt to encrypt your system during the installation of basically any Linux OS.&#xA;&#xA;Mac&#xA;&#xA;See here.&#xA;&#xA;Windows 10&#xA;&#xA;See here.&#xA;&#xA;You might also consider using VeraCrypt.&#xA;&#xA;Flash Drives / External Drives&#xA;&#xA;For this, you will use a cross-platform, open source piece of software called VeraCrypt. Just fire it up and let the program guide you. For more detailed information, see the official Veracrypt documentation.&#xA;&#xA;Folders / Partitions&#xA;&#xA;VeraCrypt can handle this, as well. &#xA;&#xA;----&#xA;&#xA;Hiding Files and Secret Messages in Plain Sight with Steganographya name=&#34;stego&#34;/a&#xA;&#xA;(Coming Soon!)&#xA;&#xA;For my last trick, I&#39;m gonna introduce you to some serious spy movie biz. We&#39;re going to learn how to use a form of encryption to hide files and messages inside of other more inconspicuous files. This portion of the guide is not yet finished, and will become available in the near future; however, Android users can get started easily with an app called PixelKnot that will allow you to embed hidden messages in image files. More to come!&#xA;&#xA;----&#xA;&#xA;Changesa name=&#34;changes&#34;/a&#xA;&#xA;11/01/2020:&#xA;&#xA;Updated link for instructions on encrypting emails in Thunderbird, as previous link had outdated information. It is no longer required to use Enigmail, as Thunderbird supports PGP encryption by default in recent versions.&#xA;Added link to cloud storage service Cryptee.&#xA;Added link to self-hosted sync service Syncthing.&#xA;Added link to CryFS as possible alternative to Cryptomator.*&#xA;&#xA;ORIGINALLY POSTED 10/26/2020.&#xA;&#xA;----&#xA;&#xA;Contact Mea name=&#34;contact&#34;/a&#xA;&#xA;failsafeprivacy (at) protonmail (dot) ch (PGP)&#xA;Keyoxide | Mastadon | Reddit&#xA;&#xA;----&#xA;&#xA;Tags&#xA;&#xA;#guide #tutorial #privacy #security #encryption #software #apps #vpn #tor #stego #opensource]]&gt;</description>
      <content:encoded><![CDATA[<p>Hello, friends! In the spirit of the EARN IT act seemingly gathering steam in the USA, I&#39;ve written a detailed guide on how to encypt, well... everything. Welcome to a lengthy blog post overstuffed with hot, sticky, sweet and sour cryptography. Bon appétit.</p>

<p>I will be attempting to update this post somewhat regularly, so check back from time to time! I&#39;ll be sure to make it known when I&#39;ve updated.</p>

<p>As always, I welcome your input—if you agree, disagree, have additions, have questions—please speak up! Feel free to reach out to me on Social Media or by Email (details at bottom of post). Let&#39;s talk and learn from each other. I&#39;ll try my best to respond as much as I can, even if it takes me a little bit of time to do so. :)</p>

<hr/>

<p><strong>UPDATED 11/01/2020</strong> (See <a href="#changes" rel="nofollow">Changes</a>)</p>

<hr/>

<h2 id="contents" id="contents">Contents</h2>
<ul><li><a href="#web" rel="nofollow">Encrypting Web Traffic</a>
<ul><li>VPN</li>
<li>Tor
<ul><li>VPN + Tor?</li></ul></li>
<li>DNS Requests</li></ul></li>
<li><a href="#comms" rel="nofollow">Encrypting Communications</a>
<ul><li>SMS/MMS and Voice Calls</li>
<li>Email</li>
<li>Private Messaging, VoIP, and/or Video Chat</li></ul></li>
<li><a href="#sync" rel="nofollow">Encrypting Synced Data</a>
<ul><li>All-in-One Solution</li>
<li>Passwords</li>
<li>2FA/MFA/OTP</li>
<li>Contacts &amp; Calendar Sync</li>
<li>Personal Notes / Journals</li>
<li>Documents</li>
<li>Cloud Storage</li></ul></li>
<li><a href="#share" rel="nofollow">Encrypting Collaborative Projects &amp; File Sharing</a>
<ul><li>Communication for Teams</li>
<li>Shared Documents</li>
<li>File Sharing</li></ul></li>
<li><a href="#files" rel="nofollow">Encrypting Your Files</a>
<ul><li>Encrypting System Drives
<ul><li>Android</li>
<li>iOS</li>
<li>Linux</li>
<li>Mac</li>
<li>Windows 10</li></ul></li>
<li>Encrypting Flash Drives / External Drives</li>
<li>Encrypted Folders / Partitions</li></ul></li>
<li><a href="#stego" rel="nofollow">Hiding Files and Secret Messages in Plain Sight with Steganography</a> (<em>Coming soon!</em>)</li>
<li><a href="#contact" rel="nofollow">Contact Me</a></li></ul>

<hr/>

<h2 id="a-name-web-encrypting-web-traffic-a" id="a-name-web-encrypting-web-traffic-a">Encrypting Web Traffic</h2>

<p>There are currently two excellent, reliable ways to encrypt your web traffic that are widely used: a VPN and TOR. Let&#39;s talk about both. I will also touch on DNS encryption at the end of the section.</p>

<h3 id="vpn" id="vpn">VPN</h3>

<p><strong>VPN</strong> stands for <strong>V</strong>irtual <strong>P</strong>rivate <strong>N</strong>etwork, and a good, trustworthy VPN is an <em>indespensible</em> tool in the fight for privacy. A VPN will generally allow you access a collection of servers across multiple countries and continents. You may have seen people using VPNs to access Netflix or YouTube content from different regions, which is definitely a nice perk, but not why I&#39;m bringing them up.</p>

<p>When you connect to a website, your IP address is logged. We could dive deeper into why this might be problematic, but if you&#39;re reading this, I&#39;m assuming you&#39;ve already got some semblance of an idea. In <em>very</em> short terms, that IP can be used to track you around the web, from site to site, mostly for marketing purposes (and potentially reasons more sinister). A VPN worth its salt will encrypt your request to connect to a site and any other data you may be uploading, then ferry it safely to a remote server before decrypting it and directing it where it&#39;s meant to go. The beauty of this is twofold:</p>
<ol><li>Your true IP address will not be revealed to the sites you visit, as it will only see the remote server&#39;s IP, from which hundreds or thousands of varying connections are made daily, effectively obscuring your identity and habits online.</li>
<li>Your ISP (Comcast, TWC, Century Link, AT&amp;T, Verizon, etc.) will only see your encrypted traffic headed to a single remote server, and not where it goes after. Essentially, they have no idea what you&#39;re doing on the web, either.</li></ol>

<p>This is <em>not</em> a foolproof method of achieving anonymity, however. Why? Because your VPN can see your true IP and exactly what you&#39;re doing with it. This is where things get tricky, and why it&#39;s so <em>crucial</em> to use a reputable VPN service.</p>

<p>I can make a few recommendations on VPNs I&#39;ve found worthy of my own trust, but first I want to detail a couple of the important facors that I look for in a VPN:</p>
<ul><li><strong>Loglessness</strong>. There&#39;s nothing from stopping a VPN service from claiming to be logless and collecting logs anyway, so there is absolutely an element of trust needed here. My personal view is that for <em>any</em> privacy strategy to work, you are going to have to need to be able to place trust in certain organizations and tools—it&#39;s inevitable. We just have to do our homework and practice with failsafes/redundancy when we can.</li>
<li><strong>Jurisdiction</strong>. In general, I am skeptical of VPNs based in the USA or China, as their privacy laws are less than stellar. A VPN based somewhere like Switzerland, however, would be subject to their remarkably forward-thinking privacy laws. Depending on your own unique use-case, you may want to consider where your VPN provider is headquartered. In researching this, you may see terms like “Five Eyes,” “Nine Eyes,” or “Fourteen Eyes” come up. This is a detailed subject, so I recommend skimming <a href="https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/" rel="nofollow">this article</a> to get a better idea of what this means for you.</li>
<li><strong>Leak Protection</strong>. Ideally, the VPN service will have a mitigation in place for <a href="https://en.wikipedia.org/wiki/DNS_leak" rel="nofollow">DNS Leaks</a>.</li>
<li><strong>Security</strong>. Arguably the most important aspect, the VPN provider needs to offer strong encryption protocols (ideally AES-128 or AES-256, avoid blowfish or anything below 128-bit encryption).</li>
<li><strong>Monetization</strong>. VPN services are expensive operations to run, and as such, any VPN that is provided at no charge should draw <em>immense</em> skepticism. You must consider how they monetize their service to properly evaluate if it will be an asset to <em>your</em> privacy.</li></ul>

<p>Luckily, comparing all of these traits and more has been made extricably easy by That One Privacy Guy through the <a href="https://thatoneprivacysite.net/#detailed-vpn-comparison" rel="nofollow">detailed VPN comparison chart on his site</a>, aptly named That One Privacy Site. Use this resource, please.</p>

<p><strong>My Recommendations:</strong> I <em>personally</em> feel comfortable using and recommending <a href="https://mullvad.net/en/" rel="nofollow">Mullvad</a>, <a href="https://protonvpn.com/" rel="nofollow">Proton VPN</a>, <a href="https://nordvpn.com/" rel="nofollow">Nord VPN</a>, or <a href="https://vpn.mozilla.org/" rel="nofollow">Mozilla VPN</a> (which piggybacks on Mullvad&#39;s servers).</p>

<blockquote><p><strong>A Note on PIA:</strong> I was a Private Internet Access user for a long time, but many are unaware that they were recently purchased by Kape Technologies, a less-than-reputable PLC that, at one time, created adware and has since rebranded as a “cybersecurity” company. I am not aware of any major changes to their policies since the acquisition, so they may still be a fine service, but the purchase was a major red flag for me and I can no longer comfortably recommend the service.</p></blockquote>

<p>You <em>can</em> host your own VPN at no cost, but this is only recommended if you have the knowledge and means to do so properly, for your own security.</p>

<h3 id="tor" id="tor">Tor</h3>

<p>Tor differs from a VPN in a few key ways. <strong>Tor</strong> is <strong>T</strong>he <strong>O</strong>nion <strong>R</strong>outing network, and it is a free global network of nodes that can only be accessed via the <a href="https://www.torproject.org/" rel="nofollow">Tor Browser</a> that runs on donations. When you connect, your web activity is encrypted and routed through a series of 3 random nodes BEFORE it makes a connection. While you can use the Tor browser to access “Clearnet” (or “normal”) websites, it also offers the ability to visit Onion sites. These are sites accessible only via the Tor network and provide an additional layer of protection.</p>

<p>Both Tor and VPNs are exceptional tools for privacy, and while there&#39;s a bit of overlap, they both have unique strenths that will make them each better suited for different use-cases. <a href="https://restoreprivacy.com/vpn-vs-tor/" rel="nofollow">Here is a more technical breakdown</a> to help decide if a VPN or Tor is better for you.</p>

<p>For more information on using Tor, see my recent post on <a href="https://failsafe.writeas.com/how-to-get-the-most-out-of-tor-in-2020" rel="nofollow">How to Get The Most Out of Tor in 2020</a>.</p>

<h4 id="vpn-tor" id="vpn-tor">VPN + Tor?</h4>

<p>So if VPNs are good, and Tor is also good, wouldn&#39;t they be better together? This is where things get a little messy, because it depends on who you ask. Many very knowledgable folks make the argument that using a VPN with Tor can compromise your anonymity. I personally subscribe to the idea that using Tor <em>over</em> a VPN (not the other way around) can significantly improve your anonymity, and here is my reasoning:</p>
<ol><li>Your ISP can see you&#39;re using Tor, so going <code>VPN &gt; Tor</code> means that your ISP won&#39;t know you&#39;re using the Tor network.</li>
<li>As far as data transfer, your packets will go <code>VPN server &gt; Tor Node #1 &gt; Tor Node #2 &gt; Tor Node #3 &gt; Target Site</code>, so whether or not you use a VPN, the site you&#39;re connecting to is only gonna see the IP of the Tor exit node, not the VPN server&#39;s IP.</li>
<li>The entry node <em>will</em> see your IP, but it sees your real IP, anyway. Using a VPN can hide your IP from the entry node, but this requres that you have a trustworthy VPN provider that is truly logless, and that you pay for the service by reasonably anonymous means.</li></ol>

<p>As far as I can tell, if done right, the only downside would be a terribly slow connection (VPNs and Tor will both take a hit on your connection speeds). Since there are some valid arguments for both sides of this old, rusty coin, I will not give you a definitive answer on whether it&#39;s right for you. Luckily, a community-managed wiki for The Tor Project has created an <a href="https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN" rel="nofollow">excellent post</a> on this subject, so I highly recommend giving it a read.</p>

<p>If you have any thoughts on this, please let me know. Let&#39;s discuss! I&#39;m here to learn, too.</p>

<h3 id="dns-requests" id="dns-requests">DNS Requests</h3>

<p>A <strong>D</strong>omain <strong>N</strong>ame <strong>S</strong>ystem (or <strong>DNS</strong>) server works much like an old school phone operator. When you type <code>reddit.com</code> into your browser, you are calling in to say, “Hello, I would like to be connected to my old pal, Reddit.” The operator will then find the phone number (or IP Address) of Reddit and help direct the connection. If you had no idea what a DNS server was, you are most likely using the DNS provided by your ISP. Many may also be using Google&#39;s DNS option, as it&#39;s quick and reliable. In both cases, your DNS requests (or the sites you are trying to visit) are unencrypted and logged by a third-party. Much like a VPN, it is possible to host your own private DNS server. This is a <em>great</em> option if you have the know-how and the resources to set it up properly, but it won&#39;t hardly be the most accessible option for many.</p>

<p>For those that use a VPN, many VPN providers include their own secure DNS. This is great! This means you don&#39;t have to do anything special while the VPN is running. If your provider offers DNS leak protection, please note that it is <strong>not</strong> recommended that you try to use <em>DNS over TLS</em> or <em>DNS over HTTPS</em>, as it can invalidate the protection.</p>

<p>If you are not using a VPN with an included DNS or are still in need of a quick and easy solution, there are lots of DNS choices out there, so I&#39;ve narrowed them down to a few that I have found to be reputable enough. You&#39;ll want to make sure that the provider you choose is equipped with DNSSEC and supports some kind of encrypted tunneling protocol, such as <strong>DoT</strong> (<strong>D</strong>NS <strong>o</strong>ver <strong>T</strong>LS) or even better, <strong><a href="https://www.dnscrypt.org/" rel="nofollow">DNSCrypt</a></strong> (see below chart for more info).</p>

<table>
<thead>
<tr>
<th align="left">Provider</th>
<th align="left">Location</th>
<th align="left">Logging</th>
<th align="left">DNSSEC</th>
</tr>
</thead>

<tbody>
<tr>
<td align="left"><a href="https://www.quad9.net/" rel="nofollow">Quad9</a></td>
<td align="left">USA</td>
<td align="left">Minimal</td>
<td align="left">Yes</td>
</tr>

<tr>
<td align="left"><a href="https://dns.watch/index" rel="nofollow">DNS.WATCH</a></td>
<td align="left">Germany</td>
<td align="left">None</td>
<td align="left">Yes</td>
</tr>

<tr>
<td align="left"><a href="https://snopyta.org/service/dns/" rel="nofollow">Snopyta</a></td>
<td align="left">Finland</td>
<td align="left">None</td>
<td align="left">Yes</td>
</tr>

<tr>
<td align="left"><a href="https://1.1.1.1/dns/" rel="nofollow">Cloudflare</a>*</td>
<td align="left">USA</td>
<td align="left">Minimal</td>
<td align="left">Yes</td>
</tr>
</tbody>
</table>

<blockquote><p><strong>*Please note:</strong> <em>Cloudflare claims that their logging is extremely minimal. Regardless, many users around the internet do not trust them as an organization. I have been unable to find enough evidence to make a truly informed recommendation regarding Cloudflare&#39;s reputability, but I am including them because, at this time, they at least appear to be committed to offering a private, secure alternative DNS. They are also the <a href="https://medium.com/@nykolas.z/dns-resolvers-performance-compared-cloudflare-x-google-x-quad9-x-opendns-149e803734e5" rel="nofollow">fastest DNS out there by a notable margin</a>. I personally would opt for another choice—such as Quad9—in the interest of privacy, but I did want to include this one as a more private alternative to Google DNS for the performance freaks.</em></p></blockquote>

<p>You can find a much more comprehensive comparison chart with more options where I borrowed some of this information from, on <a href="https://privacytools.io/providers/dns/" rel="nofollow">PrivacyTools.io</a>. As mentioned above, <a href="https://www.dnscrypt.org/" rel="nofollow">DNSCrypt</a> is <em>highly recommended</em>. To use it, you need only download a client from their website and run it. In the client, you can typically select from numerous supported DNS options, but while they are all secure options, not all of them are necessarily the most private options. This is why it&#39;s important to look over the supported choices on sites like PrivacyTools and go in knowing what you&#39;re using.</p>

<p>If you choose not to—or are unable to—use the DNSCrypt client on your chosen device, here is a quick and dirty <a href="https://www.howtogeek.com/167533/the-ultimate-guide-to-changing-your-dns-server/" rel="nofollow">guide to change your DNS server on any device</a> courtesy of HowToGeek.</p>

<hr/>

<h2 id="encrypting-communications-a-name-comms-a" id="encrypting-communications-a-name-comms-a">Encrypting Communications</h2>

<p>For some, like journalists and whistleblowers, encrypted communications are vital to their work—and in some areas, their survival. For others, we simply don&#39;t want our private messages parsed for marketing data. Both cases are completely valid. I firmly believe that <em>everyone</em> has a use for legitimately private communication and that it should be easily obtainable. As of today, fortunately, it is for many of us.</p>

<p>Here are some recommendations for a mix of paid services and <strong>FOSS</strong> (<strong>f</strong>ree and <strong>o</strong>pen <strong>s</strong>ource <strong>s</strong>oftware) for communication that provide <strong>E2EE</strong> (<strong>e</strong>nd-<strong>to</strong>-<strong>e</strong>nd <strong>e</strong>ncryption*). What this means is that all communications are fully encrypted on your device (“clientside”) and decrypted only upon arriving at the receiver&#39;s device. E2EE exists to promise the user a <em>zero-knowledge</em> service, meaning that even the company themselves cannot read your messages, nor could any government-based or malicious actors that compromise their servers. They can only be deciphered on your physical device.</p>

<blockquote><p>**Please note that for all of the following, the other user <em>must</em> use the same tool in order to get the most protection from them.*</p></blockquote>

<h3 id="sms-mms-and-voice-calls" id="sms-mms-and-voice-calls">SMS/MMS and Voice Calls</h3>
<ul><li><strong><a href="https://www.signal.org/" rel="nofollow">Signal</a> (Android/iOS/Linux/Mac/Windows) [FOSS]</strong> – An SMS application by Open Whisper Systems that can handle both plain, unencrypted text messages with anyone AND E2EE text messages with other Signal users (for mobile users—on PC, it will only allow private messaging between other Signal users). It is endorsed by Edward Snowden himself and widely used in both private and public sector by cybersecurity professionals and government officials alike. There are alternatives and forks out there, but they are not cross-compatible with Signal. Some prefer alternatives, as Signal does require a phone number on sign up, but since Signal dominates this particular niche, you&#39;re going to find way more people are already using this one, so it&#39;s easily my preferred recommendation. Signal is also capable of E2EE voice and video calls. I&#39;m often surprised at how many of my friends and contacts are already using Signal once we swap numbers.</li>
<li><strong><a href="https://mysudo.com/" rel="nofollow">MySudo</a> (Android/iOS) [PAID]</strong> – MySudo is a closed-source service by Anonyome Labs that allows users to create multiple “Sudos” or alternate identities, each with their own phone number and email address. All texts, calls, and emails between other MySudo users are free and E2EE, but you need to pay for a subscription service to take advantage of the full suite of tools. Theoretically, one could have a Sudo for personal matters, a Sudo for work, and a Sudo for finance. Let&#39;s say they leave a job or their work phone number becomes otherwise compromised—they could simply kill that number and get a new Sudo. Some users will even go so far as to never give out their actual cell number, and instead rely only on Sudo numbers. This can be a very practical way to compartmentalize your life and conceal one of your most sought-after digital assets. In my experience with it, the numbers are often rejected by businesses and online retailers that demand a phone number, but it&#39;s excellent for Craigslist dealing and many other situations.</li></ul>

<h3 id="email" id="email">Email</h3>
<ul><li><strong><a href="https://protonmail.com" rel="nofollow">Protonmail</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS/PAID]</strong> – ProtonMail is a Swiss-based, open source email service with an incredible dedication to privacy, security, and zero-knowledge. They take security so seriously, in fact, that their datacenter is located in a underground in a guarded bunker beneath 1,000 meters of solid stone. I shit you not, they are Bond-villain-level committed. You can <a href="https://protonmail.com/security-details" rel="nofollow">read more about their security features here</a>, including offerings such as self-destructing messages. They also have an onion address and can therefore be accessed securely via the Tor network. ProtonMail is handily the service that I feel most comfortable recommending out of anything else in this guide.</li>
<li><strong><a href="https://www.tutanota.com/" rel="nofollow">Tutanota</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS/PAID]</strong> – ProtonMail is a tough act to follow, but Tutanota manages to be a serious contender as another open source, privacy-conscious email provider. If for any reason you opt not to go with ProtonMail, Tutanota is a swell alternative.
&gt; <strong>Bonus Tip:</strong></li></ul>

<blockquote><p>If you are communicating with another individual that is not also using your same secure email provider, you can still use PGP encryption to secure your communications. <a href="https://support.mozilla.org/en-US/kb/openpgp-thunderbird-howto-and-faq" rel="nofollow">Here&#39;s a great guide to getting started with PGP in Mozilla Thunderbird</a>, which should work with almost any email provider. If you opt to use ProtonMail, they also allow you to send PGP encrypted emails very easily, right in the web browser! <a href="https://protonmail.com/support/knowledge-base/how-to-use-pgp/" rel="nofollow">Here is their guide for PGP with non-ProtonMail users</a>.</p></blockquote>

<h3 id="private-messaging-voip-and-or-video-chat" id="private-messaging-voip-and-or-video-chat">Private Messaging, VoIP, and/or Video Chat</h3>
<ul><li><strong><a href="https://wire.com/en/download/" rel="nofollow">Wire</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS]</strong> – Wire is an open source, Swiss-based tool for private messaging, video chat, and voice chat. You can easily create group chats, perform screen sharing, send GIFs, and more. Of course, all communication in the app is E2EE. It&#39;s my preferred alternative to Skype, Teams, and other similar tools. In my personal experience, it has also performed better and provided more stability across all platforms than some of the more commercial offerings. It&#39;s a brilliant piece of software and I highly recommend it.</li>
<li><strong><a href="https://briarproject.org/" rel="nofollow">Briar</a> (Android) [FOSS]</strong> – Briar is a unique messenger for two reasons: it offers more than just messaging with blogs, forums, and groups; it also has the ability to connect to nearby users without an internet connection. It is the only messenger I know of that will allow you to send messages locally over Bluetooth, which could be handy in a number of scenarios. For the Tor users, it also give you the option to connect over the Tor network, which is a huge perk. At the time of writing, it is only available for Android.</li>
<li><strong><a href="https://www.mumble.com/" rel="nofollow">Mumble</a> (Linux/Mac/Windows/Web) [FOSS]</strong> – Mumble is an open source alternative to Discord. It&#39;s a low-latency messenger and audio chat program built for gamers. I haven&#39;t used this one much, but my experiences have been good, if only brief.</li>
<li><strong><a href="https://pidgin.im/" rel="nofollow">Pidgin + OTR (XMPP)</a> (Tails) [FOSS]</strong> – If you are using the <a href="https://tails.boum.org/" rel="nofollow">Tails</a> live operating system, Pidgin is a great Tor-friendly messenger option, pre-installed and configured out of the box for you. Here is a <a href="https://www.youtube.com/watch?v=HsSssbs-Sso" rel="nofollow">video</a> with a detailed guide on getting this set up. <a href="https://snopyta.org/" rel="nofollow">Snopyta</a> offers a solid private XMPP server that you can use over Tor, but you can also always look to <a href="https://calyxinstitute.org/projects/digital-services/xmpp" rel="nofollow">Calyx Institute</a> or <a href="https://riseup.net/en/chat" rel="nofollow">RiseUp</a>, among others.</li>
<li><strong><a href="https://rocket.chat/" rel="nofollow">Rocket.Chat</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS]</strong> – Simply put, this is a free, open source, self-hostable replacement for Slack and other team-based collaborative chat platforms. All communication is E2EE. This platform comes highly recommended for companies, online communities, collaborations, or even just a friendly group chat.</li>
<li><strong><a href="https://meet.jit.si/" rel="nofollow">Jitsi Meet</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS]</strong> – Jitsi Meet is an open source tool for video conferencing. It works similarly to Zoom, but performs better and offers a significantly more private and secure experience. If you use Zoom for work, I do recommend looking into whether you could get others on board with switching.</li></ul>

<hr/>

<h2 id="encrypting-synced-data-a-name-sync-a" id="encrypting-synced-data-a-name-sync-a">Encrypting Synced Data</h2>

<p>We sync a lot of data with the cloud. Like, <em>a lot</em> a lot. Contacts, calendars, notes, photos, etc. These details could be particularly sensitive, as they are quite personal. This information is regularly collected by many of the apps you have on your phone—and by your phone&#39;s own operating system—to generate a targeted-marketing profile on you. They&#39;re also generally stored unencrypted, making them vulnerable to malicious actors who manage to compromise your device or a network to which you&#39;re connected. Luckily, we can fix this.</p>

<h3 id="all-in-one-solution" id="all-in-one-solution">All-in-One Solution</h3>
<ul><li><p><strong><a href="https://nextcloud.com/" rel="nofollow">NextCloud</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS]</strong> – You can think of Nextcloud like having your own personal Dropbox or OneDrive. It can sync files, calendar, contacts, notes, and more between a myriad of devices. It even has plug-ins available that expand functionality, and you can even use it for secure video calling. This is a reasonably elegant solution, and it pairs well with Cryptomator for an additional layer of security. There is a cost to this option, however: this is a service that must be hosted. This means you will either need a private server of your own to host it on, or you will need to pay a web-hosting provider to borrow space on their servers. If this is not teneble for you, please check out the individual services below. If you&#39;re looking to rent a server, there are many, many reputable VPS solutions out there—but I like to recommend <a href="https://woelkli.com/en" rel="nofollow">wölkli</a>.</p></li>

<li><p><strong><a href="https://syncthing.net/" rel="nofollow">Syncthing</a> (Android/Linux/Mac/Windows/More) [Foss]</strong> – This is a tool that will allow for seamless, continuous background syncing of files, folders, and directories between multiple devices. There is no central “cloud” server here, so your data is transfered securely between only your own devices.</p></li></ul>

<h3 id="passwords" id="passwords">Passwords</h3>
<ul><li><strong><a href="https://bitwarden.com/" rel="nofollow">Bitwarden</a> (Android/iOS/Linux/Mac/Windows/Firefox/Chromium/Web) [FOSS/Paid]</strong> – Bitwarden is among the <em>very</em> few “online” password managers that I feel comfortable recommending. One major reason is that it can be self-hosted, if you have the means. If not, I still feel Bitwarden is the best password manager with syncing capability. It&#39;s convenient, it has all the bells and whistles you might want (such as auto-fill), and it&#39;s a zero-knowledge, open source solution from a reputable company. It&#39;s every bit as secure as those syncing their KeePassXC databases with Cryptomator, but significantly easier to manage.</li></ul>

<h3 id="2fa-mfa-otp" id="2fa-mfa-otp">2FA/MFA/OTP</h3>
<ul><li><strong><a href="https://authy.com/" rel="nofollow">Authy</a> (Android/iOS/Chromium) [Free]</strong> – 2FA is one of <em>the best</em> things you can do for your own security, and Authy makes it pretty simple. Some will be concerned that Authy is not open source, and some will take issue with the fact that your 2FA codes sync with their servers. These are absolutely valid concerns, and for you, there are great options like AndOTP (Android) or KeePassXC (Multi-platform) out there; however, these apps won&#39;t sync your access tokens and you are responsible for manually creating your own backups. In my own personal research, I feel comfortable recommending Authy, particularly to those that are apt not to use 2FA due to the inconvenience, as Authy is about as convenient as 2FA gets and it is nearly always better to use 2FA than not. Authy is zero-knowledge and will sync your keys in an encrypted state. By default, Authy can only be used on a single device for your security, but you can opt to sync between multiple devices with a simple toggle in the app settings. If anything ever happens to your device, your access tokens will be backed up securely and automatically, so you don&#39;t have to worry about being locked out of an account—just don&#39;t forget your backup password.</li></ul>

<h3 id="contacts-calendar-sync" id="contacts-calendar-sync">Contacts &amp; Calendar Sync</h3>
<ul><li><strong><a href="https://www.etesync.com/" rel="nofollow">Etesync</a> (Android/iOS/Linux/Mac/Web) [FOSS/PAID]</strong> – Etesync is an open source, zero knowledge tool for transparently syncing your contacts and calendars in the background. It&#39;s based on DAVDroid, but with some much-needed security enhancements. The syncing itself is encrypted, and then the data is stored in an encrypted state locally. The best part is that you can use any Calendar or Contact apps you like—even the stock ones—and while your data will be displayed in those clients, they cannot actually parse the data. See the <a href="https://www.etesync.com/faq/" rel="nofollow">FAQ</a> for more information. It&#39;s also worth noting that they have recently added note syncing capability, and it is possible to host your own Etesync instance.</li></ul>

<h3 id="personal-notes-journal" id="personal-notes-journal">Personal Notes / Journal</h3>
<ul><li><strong><a href="https://joplinapp.org/" rel="nofollow">Joplin</a> (Android/iOS/Linux/Mac/Windows) [FOSS]</strong> – Joplin is a multi-platform note taking solution with markdown support and multiple ways to organize notes. It can be synced securely with your Nextcloud server, via WebDAV, or other cloud storage services. It&#39;s the most feature-rich option in this list, as well, and it&#39;s completely free and open source.</li>
<li><strong><a href="https://blog.etesync.com/introducing-etesync-notes/" rel="nofollow">Etesync Notes</a> (Android/iOS) [FOSS/Paid]</strong> – Still in beta, this is a newly-released alternative to Joplin that syncs directly to your Etesync account. I have not tested it thoroughly, but I can say with certainty that it&#39;s a project worth keeping an eye on, at least.</li>
<li><strong><a href="https://standardnotes.org/" rel="nofollow">Standard Notes</a> (Android/iOS/Linux/Mac/Windows) [FOSS/Paid]</strong> – This app is open source, but some of the more premium features are locked behind a paywall. For this reason, it&#39;s not my app of choice while robust options like Joplin are freely available, but it does offer a slightly different approach and a more elegant interface that many are sure to appreciate.</li>
<li><strong><a href="https://turtlapp.com/" rel="nofollow">Turtl</a> (Android/Linux/Mac/Windows) [FOSS]</strong> – I know people who swear by this app. I really wanted to love it, but I have always found this one a bit of a struggle to use, in my personal experience. That said, it is an excellent, highly secure option if it works for you!</li></ul>

<h3 id="documents" id="documents">Documents</h3>
<ul><li><strong><a href="https://cryptpad.fr/" rel="nofollow">CryptPad</a> (Web) [FOSS]</strong> – The web editors are based on OnlyOffice, my preferred Office suite. I find that it&#39;s really easy to edit in the web browser, but it&#39;s also quite simple to move local files to the cloud and vice versa.</li></ul>

<h3 id="cloud-storage" id="cloud-storage">Cloud Storage</h3>
<ul><li><p><strong><a href="https://cryptomator.org/" rel="nofollow">Cryptomator</a> (Android/iOS/Linux/Mac/Windows) [FOSS]</strong> – Cryptomator allows you to quickly and easily create an encrypted folder on your local machine. This folder can be synced with any cloud service (NextCloud, OneDrive, Dropbox, etc.) to secure your files and prevent even “big data” cloud providers like Google or Microsoft from knowing what it is that you&#39;re storing. This is my own recommendation, but there are alternatives that appear solid, like <a href="https://www.cryfs.org/" rel="nofollow">CryFS</a>.</p></li>

<li><p><strong><a href="https://crypt.ee/" rel="nofollow">Cryptee</a> (Android/iOS/Linux/Mac/Windows/Chrome OS) [FOSS/Paid]</strong> – Cryptee is a cloud service for storing photos, documents, and other personal data. A meager 100 MB of storage space is offered at no cost, but there are paid plans available up to nearly 2 TB. This is an excellent alternative to Google Photos/Drive and similar such cloud storager offerings.</p></li></ul>

<hr/>

<h2 id="encrypting-collaborative-projects-file-sharing-a-name-share-a" id="encrypting-collaborative-projects-file-sharing-a-name-share-a">Encrypting Collaborative Projects &amp; File Sharing</h2>

<h3 id="communication-for-teams" id="communication-for-teams">Communication for Teams</h3>
<ul><li><strong><a href="https://rocket.chat/" rel="nofollow">Rocket.Chat</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS]</strong> – Simply put, this is a free, open source, self-hostable replacement for Slack and other team-based collaborative chat platforms. All communication is E2EE. This platform comes highly recommended for companies, online communities, collaborations, or even just a friendly group chat.</li>
<li><strong><a href="https://meet.jit.si/" rel="nofollow">Jitsi Meet</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS]</strong> – Jitsi Meet is an open source tool for video conferencing. It works similarly to Zoom, but performs better and offers a significantly more private and secure experience. If you use Zoom for work, I do recommend looking into whether you could get others on board with switching.</li>
<li><strong><a href="https://wire.com/en/pricing/" rel="nofollow">Wire Pro/Enterprise</a> (Android/iOS/Linux/Mac/Windows/Web) [FOSS]</strong> – Wire is an open source, Swiss-based tool for private messaging, video chat, and voice chat. You can easily create group chats, perform screen sharing, send GIFs, and more. Of course, all communication in the app is E2EE. It&#39;s my preferred alternative to Skype, Teams, and other similar tools. In my personal experience, it has also performed better and provided more stability across all platforms than some of the more commercial offerings. It&#39;s a brilliant piece of software and I highly recommend it.</li></ul>

<h3 id="shared-documents" id="shared-documents">Shared Documents</h3>
<ul><li><strong><a href="https://cryptpad.fr/" rel="nofollow">CryptPad</a> (Web) [FOSS]</strong> – The web editors are based on OnlyOffice, my preferred Office suite. I find that it&#39;s really easy to edit in the web browser, but it&#39;s also quite simple to move local files to the cloud and vice versa. This suite of tools includes the ability to share documents between teams, with real-time updating and editing capability.</li></ul>

<h3 id="file-sharing" id="file-sharing">File Sharing</h3>
<ul><li><strong><a href="https://onionshare.org/" rel="nofollow">Onion Share</a> (Linux/Mac/Windows) [FOSS]</strong> – Onion Share uses the Tor network to securely and anonymously share files of any size. The other party does not even need to have Onion Share, as long as they have the Tor browser.</li>
<li><strong><a href="https://www.swisstransfer.com/en" rel="nofollow">SwissTransfer</a> (Web) [Free]</strong> – Temporary file transfer solution for files up to 50 GB. Free and does not require registration. The service is based in Switzerland, so it is protected by Swiss privacy laws.</li>
<li><strong><a href="https://blackhole.run/" rel="nofollow">Blackhole</a> (Mac/Windows) [FOSS]</strong> – BlackHole is a blockchain-based file sharing protocol.</li></ul>

<hr/>

<h2 id="encrypting-your-files-a-name-files-a" id="encrypting-your-files-a-name-files-a">Encrypting Your Files</h2>

<h3 id="system-drives" id="system-drives">System Drives</h3>

<h4 id="android" id="android">Android</h4>

<p><a href="https://www.androidauthority.com/how-to-encrypt-android-device-326700/" rel="nofollow">See here</a>.</p>

<h4 id="ios" id="ios">iOS</h4>

<p><a href="https://ssd.eff.org/en/module/how-encrypt-your-iphone" rel="nofollow">See here</a>.</p>

<h4 id="linux" id="linux">Linux</h4>

<p><a href="https://averagelinuxuser.com/encrypt-hard-drive-in-linux/" rel="nofollow">See here</a>.</p>

<p>Note that you can also opt to encrypt your system during the installation of basically any Linux OS.</p>

<h4 id="mac" id="mac">Mac</h4>

<p><a href="https://support.apple.com/en-us/HT204837" rel="nofollow">See here</a>.</p>

<h4 id="windows-10" id="windows-10">Windows 10</h4>

<p><a href="https://ssd.eff.org/en/module/how-encrypt-your-windows-device" rel="nofollow">See here</a>.</p>

<p>You might also consider using <a href="https://www.veracrypt.fr/en/" rel="nofollow">VeraCrypt</a>.</p>

<h3 id="flash-drives-external-drives" id="flash-drives-external-drives">Flash Drives / External Drives</h3>

<p>For this, you will use a cross-platform, open source piece of software called <a href="https://www.veracrypt.fr/en/" rel="nofollow">VeraCrypt</a>. Just fire it up and let the program guide you. For more detailed information, see the <a href="https://www.veracrypt.fr/en/Documentation.html" rel="nofollow">official Veracrypt documentation</a>.</p>

<h3 id="folders-partitions" id="folders-partitions">Folders / Partitions</h3>

<p><a href="https://www.veracrypt.fr/en/" rel="nofollow">VeraCrypt</a> can handle this, as well.</p>

<hr/>

<h2 id="hiding-files-and-secret-messages-in-plain-sight-with-steganography-a-name-stego-a" id="hiding-files-and-secret-messages-in-plain-sight-with-steganography-a-name-stego-a">Hiding Files and Secret Messages in Plain Sight with Steganography</h2>

<p><strong>(Coming Soon!)</strong></p>

<p>For my last trick, I&#39;m gonna introduce you to some serious spy movie biz. We&#39;re going to learn how to use a form of encryption to hide files and messages inside of other more inconspicuous files. This portion of the guide is not yet finished, and will become available in the near future; however, Android users can get started easily with an app called PixelKnot that will allow you to embed hidden messages in image files. More to come!</p>

<hr/>

<h2 id="changes-a-name-changes-a" id="changes-a-name-changes-a">Changes</h2>

<p><strong>11/01/2020:</strong></p>
<ul><li><em>Updated link for instructions on encrypting emails in Thunderbird, as previous link had outdated information. It is no longer required to use Enigmail, as Thunderbird supports PGP encryption by default in recent versions.</em></li>
<li><em>Added link to cloud storage service Cryptee.</em></li>
<li><em>Added link to self-hosted sync service Syncthing.</em></li>
<li><em>Added link to CryFS as possible alternative to Cryptomator.</em></li></ul>

<p><strong>ORIGINALLY POSTED 10/26/2020.</strong></p>

<hr/>

<h2 id="contact-me-a-name-contact-a" id="contact-me-a-name-contact-a">Contact Me</h2>

<p>failsafeprivacy (at) protonmail (dot) ch (<a href="https://keys.openpgp.org/vks/v1/by-fingerprint/84B7247CEDBE198ABC1458C5EDC8B435D608658C" rel="nofollow">PGP</a>)
<a href="https://keyoxide.org/84B7247CEDBE198ABC1458C5EDC8B435D608658C" rel="nofollow">Keyoxide</a> | <a href="https://fosstodon.org/@failsafe" rel="nofollow">Mastadon</a> | <a href="https://www.reddit.com/user/Failsafe-Privacy" rel="nofollow">Reddit</a></p>

<hr/>

<h2 id="tags" id="tags">Tags</h2>

<p><a href="https://failsafe.writeas.com/tag:guide" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">guide</span></a> <a href="https://failsafe.writeas.com/tag:tutorial" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tutorial</span></a> <a href="https://failsafe.writeas.com/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://failsafe.writeas.com/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://failsafe.writeas.com/tag:encryption" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">encryption</span></a> <a href="https://failsafe.writeas.com/tag:software" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">software</span></a> <a href="https://failsafe.writeas.com/tag:apps" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">apps</span></a> <a href="https://failsafe.writeas.com/tag:vpn" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">vpn</span></a> <a href="https://failsafe.writeas.com/tag:tor" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tor</span></a> <a href="https://failsafe.writeas.com/tag:stego" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">stego</span></a> <a href="https://failsafe.writeas.com/tag:opensource" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">opensource</span></a></p>
]]></content:encoded>
      <guid>https://failsafe.writeas.com/how-to-encrypt-everything</guid>
      <pubDate>Mon, 26 Oct 2020 20:24:32 +0000</pubDate>
    </item>
    <item>
      <title>How to Get the Most Out of Tor in 2020</title>
      <link>https://failsafe.writeas.com/how-to-get-the-most-out-of-tor-in-2020?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Tor is a magnificent beast. Despite the stories you&#39;ve undoubtedly heard, it&#39;s not just for ne&#39;er-do-wells and miscreants (though they are certainly present).!--more-- If you are wondering what exactly a &#34;Tor&#34; is, we should look no further for explanation than to the Tor Project themselves:&#xA;&#xA;&#34;The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor&#39;s users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.&#34; sup1/sup&#xA;&#xA;In this post, I&#39;m gonna keep things relatively brief and go over some of the ways you can incorporate Tor into your digital life. The Tor Project team has done some remarkable work on making Tor as secure and private as possible without requiring much, if any, user tinkering. If you&#39;re new to this sort of thing, don&#39;t be intimidated--you&#39;ll pick it up fast. If you&#39;ve been around the block with Tor in the past, then I hope this post introduces you to some new tools or strategies. &#xA;&#xA;Please note that Tor alone will not make you completely anonymous. It will protect the transport of your data, it will disguise you against trackers online, and it will help you to beat censorship in your region; however, it will not simply allow you to act illegally or immorally without repercussion. There is still a need for common sense and decency. That said, the Tor network will be an indispensible tool to you in the fight for privacy online in this year of 20XX--the future.&#xA;&#xA;The Tor project is open source, freely available, and powered solely on donations. If you get a lot out of it and you have the means, it would be mighty fine of you to give back by making a donation or buying some radical swag to help support the project. It&#39;s also helpful to spread the word--the more Tor users there are, the more anonymous we all become. Please feel free to share this post with friends and family, or just enthusiastically relay the best bits to them yourself. Bonus points if you imitate what you think my voice might sound like--I assure you, it is silly. &#xA;&#xA;----&#xA;&#xA;LAST UPDATED: 10/20/2020 (See Changes)&#xA;&#xA;----&#xA;&#xA;Configuring the Tor Browser&#xA;&#xA;If I&#39;m being honest, there&#39;s not much to do here. The Tor browser is configured by default as such for very specific reasons, and it&#39;s generally good practice to avoid using any additional add-ons or making any tweaks to the configuration. The main reason (of many) that it&#39;s touchy to change things around, is because any changes will make your fingerprint more unique. A unique fingerprint means trackers will have an easier time identifying you as you move from site to site. Ideally, you want the most run-of-mill, least conspicuous fingerprint you can possibly have so that you blend in with the crowd. If your data points all look basically the same as every other Tor user, we all collectively gain that much more anonymity. &#xA;&#xA;In light of this, there are really only two things I recommend tweaking:&#xA;&#xA;1. Change your security level - In Tor, there are three Security Level settings to choose from. I recommend Safest, both because of--and in spite of--the fact that it is the most restrictive setting of the bunch. This can always be tweaked if you happen across a site that is broken by this setting, but for normal activity, this will give you the best protection against the ever watchful eye of Big Daddy Data and his unsavory pals (there&#39;s a free band name for you, you&#39;re welcome). If you do go the Safest route, you&#39;ll want to learn how to use NoScript. If you&#39;ve used it before, you&#39;ll know that you can normally kind of &#34;train&#34; it as you browse, but this is not the case with the Tor browser as your settings are (very intentionally) reset with each fresh start of the program. As such, you&#39;ll want to understand how it works and be able to make changes on the fly. If this is too complicated for now (or if you can&#39;t be arsed to learn), or if often-used sites are breaking for you, then go with the Safer setting. This will be much less restrictive than Safest and still provide more protection than default. &#xA;&#xA;2. Prioritize Onion Services - Under the Privacy and Security tab in the Settings menu, you can set Prioritize Onion Services to Always. This will make it so that when you visit a clearnet site, Tor will check if there is a known Onion version of the site and redirect you to the Tor version. This feature seems to be hit or miss, as in my testing, it didn&#39;t always detect a Tor version of a site; however, when it does work, it&#39;s a great way to increase your security while browsing. If you don&#39;t set this feature, it will simply ask if you&#39;d care to switch when it comes across a site with an available Onion domain, so it&#39;s not completely necessary to set this, though I personally find it much more convenient to have it do this for me automatically.&#xA;&#xA;3. (Optional) Creatorrc - With Creatorrc, you can generate a more secure torrc file (the &#34;sector&#34; profile) for the Tor Browser. This will prevent your browser from utilizing relays known to use out-of-date software or have other security flaws that could be exploited to de-anonymize you. Please note that this tool is not endorsed nor recommended by The Tor Project. It is also worth noting that using this may have an effect on your speeds and/or how often you encounter CAPTCHAs, and it is not currently compatible with Tails users. I am personally a fan of the sector profile, but I highly encourage you to do your own homework before diving in. &#xA;&#xA;That&#39;s it! You&#39;re good to go. Feel free to explore the interwebs in peace. &#xA;&#xA;----&#xA;&#xA;Use Good OPSEC&#xA;&#xA;OPSEC is short for Operations Security. In the simplest terms, &#34;common sense.&#34; I won&#39;t delve in to this too deeply, but if you&#39;re looking to maximize your anonimity, here are some basic tips:&#xA;&#xA;Don&#39;t use your real name, common aliases, email addresses, etc. outside the Tor network. &#xA;Conversely, don&#39;t use aliases you use within the Tor network elsewhere online.&#xA;Don&#39;t log in to existing accounts, like Facebook or Twitter, from the Tor network.&#xA;Make as few accounts as you can.&#xA;Use a unique email/username for each account that you create (Guerilla Mail and AnonAddy are helpful for this).&#xA;Put to use a reliable password manager (like KeePassXC or Bitwarden) with unique passwords for all accounts and use 2FA wherever possible. &#xA;Don&#39;t use Tor and another browser at the same time.&#xA;Generate &#34;New Identities&#34; within Tor semi-frequently.&#xA;Be wary of other devices on your network; for example, sometimes, advertisements might contain an inaudible frequency that can be picked up by your phone to confirm that you were exposed to the ad. This is a method of cross-tracking utilized by marketers, and it can be used to de-anonymize you. I know this sounds tinfoil-hatesque, but I assure you, it&#39;s been covered by legitimate news outlets on multiple occasions. sup2/sup sup3/sup sup4/sup&#xA;Utilize metadata anonymization tools before uploading photos, videos, audio files, or other documents online. I would recommend MAT2 or EXIFCleaner for PC/Mac users, or Scrambled EXIF (F-Droid, Play Store) for Android.&#xA;&#xA;----&#xA;&#xA;Sending Files with OnionShare&#xA;&#xA;OnionShare is a cool utility to send files of any size securely and anonymously over the Tor network. This will be an essential tool for journalists, whistleblowers, and individuals under oppressive regimes, but it&#39;s something we can all benefit from in this age of mass surveillance.&#xA;&#xA;To use it, simply install the program and launch it. You will be able to drag and drop files, and then the program will generate a unique Onion URL for you to share. Remember, the security of your files is ONLY as secure as the means that you use to send this link. Make sure to share the link only with the trusted recipient over end-to-end encrypted communications. Once the recipient has the link, they will only need the Tor browser in order to visit the link and download the attached files. The receiving party is not required to use OnionShare. &#xA;&#xA;----&#xA;&#xA;Send Emails over Tor with TorBirdy&#xA;&#xA;TorBirdy is a relatively simple add-on for Mozilla Thunderbird that will allow you to sync your inbox and send emails via the Tor network. This would pair well with an Onion-based email provider and Enigmail for PGP encryption.&#xA;&#xA;Alternatively, you can simply use ProtonMail&#39;s Onion Site (.onion link) to send encrypted emails with PGP (or directly to other ProtonMail users), all from the comfort of your own Tor Browser.&#xA;&#xA;If you are using a system like Tails or Whonix (covered below), you will not need this.&#xA;&#xA;----&#xA;&#xA;Torify the Whole Damn System!&#xA;&#xA;With an OS pre-configured to use Tor by default--such as Tails, Whonix (or Qubes + Whonix), or Subgraph OS (Alpha)--all of the web traffic from your entire system, not just the web browser, will be protected by the Tor network. It&#39;s also possible to rig up Tor as a proxy, but this can be detrimental if not properly configured and you are missing out on the security benefits provided by a hardened system. &#xA;&#xA;With something like Tails on a USB drive, you can boot into a secure OS from that drive on almost any system. This means that you don&#39;t necessarily have to have a separate drive or partition specifically for this, you can simply plug in the little drive and boot it up. You can read more about how Tails works here, and you can find a guided setup here. The beauty of tails is that it&#39;s non-persistent, so every time you shutdown or reboot, it wipes everything clean. If you so choose, you can set up an encrypted persistent partition very easily that will allow you to save only specific files and configurations that you want to keep on the drive.&#xA;&#xA;Whonix is intended to be used as a virtual machine. It is not, by default, an amnesiac system like Tails. Instead, it is a persistent, hardened operating system that helps to compartmentalize your activity. The Whonix Workstation can be run in &#34;live&#34; mode or used in conjunction with VirtualBox&#39;s snapshot feature to have a similar amnesiac presence to Tails, but it is intended to be used as a convenient daily-driver and is therefore an excellent alternative to Tails depending on your own personal needs. Some will even use both for different circumstances--it&#39;s not about picking the best OS, but about what works for you. &#xA;&#xA;SubgraphOS is in alpha and is not currently recommended, but it&#39;s got a very promising feature set that&#39;s worth keeping an eye on.&#xA;&#xA;----&#xA;&#xA;Take Tor With You&#xA;&#xA;Mobile Apps&#xA;&#xA;You can use Tor on your Android phone! You can either use the Tor Browser app on its own, or you can use Orbot to run multiple apps/all of your device&#39;s connections through Tor. Both apps are available from F-Droid or Google Play. &#xA;&#xA;iOS does not currenty have an official Tor app, but Onion Browser from the app store is a good soluton for now.&#xA;&#xA;Tails USB&#xA;&#xA;By installing Tails to a USB drive (as mentioned above), you can boot into a secure operating system that routes all traffic through Tor by default on basically any computer, anywhere. The only requirement is that the computer in question does not have secure boot enabled, though this can pretty easily be disabled if you have access to the bios. &#xA;&#xA;TorBox&#xA;&#xA;If you feel like busting out the glue sticks and pipe cleaners to get your DIY on, you can turn a Raspberry Pi into a portable Tor router using TorBox. Just follow the instructions closely and it&#39;s fairly easy to pull off. This is a handy little thing to carry around and protect your web traffic over public wifi. It&#39;s also great to have at home, if you want to route an IoT device like your Smart TV or game console through the Tor network (note that this will almost certainly have a negative impact on your streaming/gaming performance).&#xA;&#xA;----&#xA;&#xA;Useful Onion Sites&#xA;&#xA;Finally, here is a list of sites you can only access via the Tor network. Bookmark these bad boys! Onions come and go all the time, so I apologize if any of these links are broken by the time you read this. I will try to keep them as up-to-date as I can. &#xA;&#xA;The Tor Project - http://expyuzz4wqqyqhjn.onion/&#xA;DuckDuckGo (Search Engine) - https://3g2upl4pq6kufc4m.onion/&#xA;ProtonMail (Email Provider) - https://protonirockerxow.onion/&#xA;Cock.li (Email Provider) - http://cockmailwwfvrtqj.onion&#xA;Onion Mail (Email Provider) - https://en.onionmail.info/directory.html (Clearnet, links to multiple instances hosted on Onions)&#xA;Mail2Tor (Email Provider) - http://mail2tor2zyjdctd.onion/&#xA;Guerilla Mail (Temporary Burner Email Addresses) -  http://grrmailb3fxpjbwm.onion/ &#xA;PrivacyTools (Privacy Org. with Many Tools and Resources) - http://www.privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/&#xA;Snopyta (Privacy Org. with Multiple Tools) - http://cct5wy6mzgmft24xzw6zeaf55aaqmo6324gjlsghdhbiw5gdaaf4pkad.onion/&#xA;RiseUp Onion Services (Privacy Org. with Multiple Tools) -  http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion/en/security/network-security/tor#riseups-tor-onion-services (Multiple Tools)&#xA;Systemli Onion Services (Privacy Org. with Multiple Tools) - http://7sk2kov2xwx6cbc32phynrifegg6pklmzs7luwcggtzrnlsolxxuyfyd.onion/en/service/onion.html (Multiple Tools)&#xA;Calyx Institute (Privacy Org. with Multiple Tools) - http://ijeeynrc6x2uy5ob.onion (Multiple Tools)&#xA;BBC News (News) - https://www.bbcnewsv2vjtpsuy.onion/&#xA;Associated Press (News) - http://3expgpdnrrzezf7r.onion/&#xA;The New York Times (News) - https://www.nytimes3xbfgragh.onion/&#xA;ProPublica (News) - https://p53lf57qovyuvwsc6xnrppyply3vtqm7l6pcobkmyqsiofyeznfu5uqd.onion/&#xA;Business Insider (News) - http://doaxi7t7lkctvq5i.onion/&#xA;Buzzfeed News (News) - https://bfnews3u2ox4m4ty.onion/&#xA;Internet Archive (Archives) - http://archivebyd3rzt3ehjpm4c3bjkyxv3hjleiytnvxcn7x32psn2kxcuid.onion/&#xA;Archive.is (Archives) - http://archivecaslytosk.onion&#xA;OnionShare (Software) - http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion/&#xA;Mullvad VPN (Software) - http://xcln5hkbriyklr6n.onion&#xA;Tails (Software) - https://tails.boum.org/index.en.html&#xA;Qubes OS (Software) - http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/&#xA;Whonix (Software) - http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/&#xA;Debian (Software) http://sejnfjrq6szgca7v.onion/&#xA;&#xA;Directories&#xA;&#xA;If you, like Booker T., find yourself needing mo&#39; onions, here are some good resources:&#xA;&#xA;Alec Muffett&#39;s Real World Onion Sites List (Clearnet)&#xA;List of Tor Onion Services on Wikipedia (Clearnet)&#xA;/r/Onions on Reddit (Clearnet)&#xA;&#xA;----&#xA;&#xA;Sourcesa name=&#34;sources&#34;/a&#xA;&#xA;sup1/sup https://2019.www.torproject.org/about/overview.html.en&#xA;&#xA;sup2/sup https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/&#xA;&#xA;sup3/sup https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/&#xA;&#xA;sup4/sup https://www.cbsnews.com/news/google-removes-apps-that-use-ultrasonic-frequencies-to-track-users/&#xA;&#xA;----&#xA;&#xA;Changesa name=&#34;changes&#34;/a&#xA;&#xA;POSTED 10/19/2020&#xA;&#xA;Edit 10/20/2020: Added &#34;Prioritize Onion Services&#34; to the Configuring the Tor Browser section&#xA;&#xA;Edit 10/19/2020: Minor Formatting Revisions, added &#34;Contact Me&#34; section&#xA;&#xA;----&#xA;&#xA;Contact Me&#xA;&#xA;failsafeprivacy (at) protonmail (dot) ch (PGP)&#xA;Keyoxide | Mastadon | Reddit&#xA;&#xA;----&#xA;&#xA;Tags&#xA;&#xA;#tutorial #privacy #security #browser #tor #software #opensource]]&gt;</description>
      <content:encoded><![CDATA[<p>Tor is a magnificent beast. Despite the stories you&#39;ve undoubtedly heard, it&#39;s not just for ne&#39;er-do-wells and miscreants (though they are certainly present). If you are wondering what exactly a “Tor” is, we should look no further for explanation than to the <a href="https://www.torproject.org/" rel="nofollow">Tor Project</a> themselves:</p>

<p><em>“The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor&#39;s users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.”</em> <sup><a href="#sources" rel="nofollow"><strong>1</strong></a></sup></p>

<p>In this post, I&#39;m gonna keep things relatively brief and go over some of the ways you can incorporate Tor into your digital life. The Tor Project team has done some remarkable work on making Tor as secure and private as possible without requiring much, if any, user tinkering. If you&#39;re new to this sort of thing, don&#39;t be intimidated—you&#39;ll pick it up fast. If you&#39;ve been around the block with Tor in the past, then I hope this post introduces you to some new tools or strategies.</p>

<p>Please note that Tor alone will not make you completely anonymous. It will protect the transport of your data, it will disguise you against trackers online, and it will help you to beat censorship in your region; however, it will not simply allow you to act illegally or immorally without repercussion. There is still a need for common sense and decency. That said, the Tor network will be an indispensible tool to you in the fight for privacy online in this year of 20XX—<em>the future</em>.</p>

<p>The Tor project is open source, freely available, and powered solely on donations. If you get a lot out of it and you have the means, it would be mighty fine of you to give back by <a href="https://donate.torproject.org/" rel="nofollow">making a donation or buying some radical swag</a> to help support the project. It&#39;s also helpful to spread the word—the more Tor users there are, the more anonymous we all become. Please feel free to share this post with friends and family, or just enthusiastically relay the best bits to them yourself. Bonus points if you imitate what you think my voice might sound like—I assure you, it is silly.</p>

<hr/>

<p><strong>LAST UPDATED: 10/20/2020</strong> (See <a href="#changes" rel="nofollow">Changes</a>)</p>

<hr/>

<h2 id="configuring-the-tor-browser" id="configuring-the-tor-browser">Configuring the Tor Browser</h2>

<p>If I&#39;m being honest, there&#39;s not much to do here. The Tor browser is configured by default as such for very specific reasons, and it&#39;s generally good practice to avoid using any additional add-ons or making any tweaks to the configuration. The main reason (of many) that it&#39;s touchy to change things around, is because any changes will make your fingerprint more unique. A unique fingerprint means trackers will have an easier time identifying you as you move from site to site. Ideally, you want the most run-of-mill, least conspicuous fingerprint you can possibly have so that you blend in with the crowd. If your data points all look basically the same as every other Tor user, we all collectively gain that much more anonymity.</p>

<p>In light of this, there are really only two things I recommend tweaking:</p>

<p><strong>1. Change your security level</strong> – In Tor, there are three Security Level settings to choose from. I recommend <em>Safest</em>, both because of—and in spite of—the fact that it is the most restrictive setting of the bunch. This can always be tweaked if you happen across a site that is broken by this setting, but for normal activity, this will give you the best protection against the ever watchful eye of Big Daddy Data and his unsavory pals (there&#39;s a free band name for you, you&#39;re welcome). If you do go the <em>Safest</em> route, you&#39;ll want to learn how to use NoScript. If you&#39;ve used it before, you&#39;ll know that you can normally kind of “train” it as you browse, but this is not the case with the Tor browser as your settings are (very intentionally) reset with each fresh start of the program. As such, you&#39;ll want to understand how it works and be able to make changes on the fly. If this is too complicated for now (or if you can&#39;t be arsed to learn), <em>or</em> if often-used sites are breaking for you, then go with the <em>Safer</em> setting. This will be much less restrictive than <em>Safest</em> and still provide more protection than default.</p>

<p><strong>2. Prioritize Onion Services</strong> – Under the <em>Privacy and Security</em> tab in the Settings menu, you can set <em>Prioritize Onion Services</em> to <em>Always</em>. This will make it so that when you visit a clearnet site, Tor will check if there is a known Onion version of the site and redirect you to the Tor version. This feature seems to be hit or miss, as in my testing, it didn&#39;t always detect a Tor version of a site; however, when it does work, it&#39;s a great way to increase your security while browsing. If you don&#39;t set this feature, it will simply ask if you&#39;d care to switch when it comes across a site with an available Onion domain, so it&#39;s not completely necessary to set this, though I personally find it much more convenient to have it do this for me automatically.</p>

<p><strong>3. (Optional) Creatorrc</strong> – With <a href="https://github.com/hephaest0s/creatorrc" rel="nofollow">Creatorrc</a>, you can generate a more secure torrc file (the “sector” profile) for the Tor Browser. This will prevent your browser from utilizing relays known to use out-of-date software or have other security flaws that could be exploited to de-anonymize you. Please note that this tool is <em>not endorsed nor recommended by The Tor Project</em>. It is also worth noting that using this may have an effect on your speeds and/or how often you encounter CAPTCHAs, and it is not currently compatible with Tails users. I am personally a fan of the sector profile, but I highly encourage you to do your own homework before diving in.</p>

<p>That&#39;s it! You&#39;re good to go. Feel free to explore the interwebs in peace.</p>

<hr/>

<h2 id="use-good-opsec" id="use-good-opsec">Use Good OPSEC</h2>

<p>OPSEC is short for Operations Security. In the simplest terms, “common sense.” I won&#39;t delve in to this too deeply, but if you&#39;re looking to maximize your anonimity, here are some basic tips:</p>
<ul><li>Don&#39;t use your real name, common aliases, email addresses, etc. outside the Tor network.</li>
<li>Conversely, don&#39;t use aliases you use within the Tor network elsewhere online.</li>
<li>Don&#39;t log in to existing accounts, like Facebook or Twitter, from the Tor network.</li>
<li>Make as few accounts as you can.</li>
<li>Use a unique email/username for each account that you create (<a href="http://grrmailb3fxpjbwm.onion/" rel="nofollow">Guerilla Mail</a> and <a href="https://anonaddy.com/" rel="nofollow">AnonAddy</a> are helpful for this).</li>
<li>Put to use a reliable password manager (like <a href="https://keepassxc.org/" rel="nofollow">KeePassXC</a> or <a href="https://bitwarden.com/" rel="nofollow">Bitwarden</a>) with unique passwords for all accounts and use 2FA wherever possible.</li>
<li>Don&#39;t use Tor and another browser at the same time.</li>
<li>Generate “New Identities” within Tor semi-frequently.</li>
<li>Be wary of other devices on your network; for example, sometimes, advertisements might contain an inaudible frequency that can be picked up by your phone to confirm that you were exposed to the ad. This is a method of cross-tracking utilized by marketers, and it can be used to de-anonymize you. I know this sounds tinfoil-hatesque, but I assure you, it&#39;s been covered by legitimate news outlets on multiple occasions. <sup><a href="#sources" rel="nofollow"><strong>2</strong></a></sup> <sup><a href="#sources" rel="nofollow"><strong>3</strong></a></sup> <sup><a href="#sources" rel="nofollow"><strong>4</strong></a></sup></li>
<li>Utilize metadata anonymization tools before uploading photos, videos, audio files, or other documents online. I would recommend <a href="https://0xacab.org/jvoisin/mat2" rel="nofollow">MAT2</a> or <a href="https://exifcleaner.com/" rel="nofollow">EXIFCleaner</a> for PC/Mac users, or <a href="https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/" rel="nofollow">Scrambled EXIF</a> (F-Droid, Play Store) for Android.</li></ul>

<hr/>

<h2 id="sending-files-with-onionshare" id="sending-files-with-onionshare">Sending Files with OnionShare</h2>

<p><a href="https://onionshare.org/" rel="nofollow">OnionShare</a> is a cool utility to send files of any size securely and anonymously over the Tor network. This will be an essential tool for journalists, whistleblowers, and individuals under oppressive regimes, but it&#39;s something we can all benefit from in this age of mass surveillance.</p>

<p>To use it, simply install the program and launch it. You will be able to drag and drop files, and then the program will generate a unique Onion URL for you to share. Remember, the security of your files is ONLY as secure as the means that you use to send this link. Make sure to share the link only with the trusted recipient over end-to-end encrypted communications. Once the recipient has the link, they will only need the Tor browser in order to visit the link and download the attached files. The receiving party is not required to use OnionShare.</p>

<hr/>

<h2 id="send-emails-over-tor-with-torbirdy" id="send-emails-over-tor-with-torbirdy">Send Emails over Tor with TorBirdy</h2>

<p><a href="https://addons.thunderbird.net/en-US/thunderbird/addon/torbirdy/" rel="nofollow">TorBirdy</a> is a relatively simple add-on for <a href="https://www.thunderbird.net/en-US/" rel="nofollow">Mozilla Thunderbird</a> that will allow you to sync your inbox and send emails via the Tor network. This would pair well with an Onion-based email provider and <a href="https://www.enigmail.net/index.php/en/" rel="nofollow">Enigmail</a> for PGP encryption.</p>

<p>Alternatively, you can simply use <a href="https://protonirockerxow.onion/" rel="nofollow">ProtonMail&#39;s Onion Site</a> (<em>.onion link</em>) to send encrypted emails with PGP (or directly to other ProtonMail users), all from the comfort of your own Tor Browser.</p>

<p>If you are using a system like Tails or Whonix (covered below), you will not need this.</p>

<hr/>

<h2 id="torify-the-whole-damn-system" id="torify-the-whole-damn-system">Torify the Whole Damn System!</h2>

<p>With an OS pre-configured to use Tor by default—such as <a href="https://tails.boum.org/index.en.html" rel="nofollow">Tails</a>, <a href="https://www.whonix.org/" rel="nofollow">Whonix</a> (or <a href="https://www.qubes-os.org/doc/whonix/" rel="nofollow">Qubes + Whonix</a>), or <a href="https://subgraph.com/" rel="nofollow">Subgraph OS</a> (<em>Alpha</em>)—all of the web traffic from your entire system, not just the web browser, will be protected by the Tor network. It&#39;s also possible to rig up Tor as a proxy, but this can be detrimental if not properly configured and you are missing out on the security benefits provided by a hardened system.</p>

<p>With something like Tails on a USB drive, you can boot into a secure OS from that drive on almost any system. This means that you don&#39;t necessarily have to have a separate drive or partition specifically for this, you can simply plug in the little drive and boot it up. You can read more about <a href="https://tails.boum.org/about/index.en.html" rel="nofollow">how Tails works here</a>, and you can find a <a href="https://tails.boum.org/install/index.en.html" rel="nofollow">guided setup here</a>. The beauty of tails is that it&#39;s non-persistent, so every time you shutdown or reboot, it wipes everything clean. If you so choose, you can set up an encrypted persistent partition <a href="https://tails.boum.org/doc/first_steps/persistence/configure/index.en.html" rel="nofollow">very easily</a> that will allow you to save only specific files and configurations that you want to keep on the drive.</p>

<p><a href="https://www.whonix.org/" rel="nofollow">Whonix</a> is intended to be used as a virtual machine. It is not, by default, an amnesiac system like Tails. Instead, it is a persistent, hardened operating system that helps to compartmentalize your activity. The Whonix Workstation can be run in “live” mode or used in conjunction with VirtualBox&#39;s snapshot feature to have a similar amnesiac presence to Tails, but it is intended to be used as a convenient daily-driver and is therefore an excellent alternative to Tails depending on your own personal needs. Some will even use both for different circumstances—it&#39;s not about picking the best OS, but about what works for <em>you</em>.</p>

<p>SubgraphOS is in alpha and is not currently recommended, but it&#39;s got a very promising feature set that&#39;s worth keeping an eye on.</p>

<hr/>

<h2 id="take-tor-with-you" id="take-tor-with-you">Take Tor With You</h2>

<h3 id="mobile-apps" id="mobile-apps">Mobile Apps</h3>

<p>You can use Tor on your Android phone! You can either use the Tor Browser app on its own, or you can use Orbot to run multiple apps/all of your device&#39;s connections through Tor. Both apps are available from F-Droid or Google Play.</p>

<p>iOS does not currenty have an official Tor app, but Onion Browser from the app store is a good soluton for now.</p>

<h3 id="tails-usb" id="tails-usb">Tails USB</h3>

<p>By installing <a href="https://tails.boum.org/" rel="nofollow">Tails</a> to a USB drive (as mentioned above), you can boot into a secure operating system that routes all traffic through Tor by default on basically any computer, anywhere. The only requirement is that the computer in question does not have secure boot enabled, though this can pretty easily be disabled if you have access to the bios.</p>

<h3 id="torbox" id="torbox">TorBox</h3>

<p>If you feel like busting out the glue sticks and pipe cleaners to get your DIY on, you can turn a Raspberry Pi into a portable Tor router using <a href="https://www.torbox.ch/" rel="nofollow">TorBox</a>. Just follow the instructions closely and it&#39;s fairly easy to pull off. This is a handy little thing to carry around and protect your web traffic over public wifi. It&#39;s also great to have at home, if you want to route an IoT device like your Smart TV or game console through the Tor network (note that this will almost certainly have a negative impact on your streaming/gaming performance).</p>

<hr/>

<h2 id="useful-onion-sites" id="useful-onion-sites">Useful Onion Sites</h2>

<p>Finally, here is a list of sites you can only access via the Tor network. Bookmark these bad boys! Onions come and go all the time, so I apologize if any of these links are broken by the time you read this. I will try to keep them as up-to-date as I can.</p>
<ul><li><strong>The Tor Project</strong> – <a href="http://expyuzz4wqqyqhjn.onion/" rel="nofollow">http://expyuzz4wqqyqhjn.onion/</a></li>
<li><strong>DuckDuckGo</strong> (<em>Search Engine</em>) – <a href="https://3g2upl4pq6kufc4m.onion/" rel="nofollow">https://3g2upl4pq6kufc4m.onion/</a></li>
<li><strong>ProtonMail</strong> (<em>Email Provider</em>) – <a href="https://protonirockerxow.onion/" rel="nofollow">https://protonirockerxow.onion/</a></li>
<li><strong>Cock.li</strong> (<em>Email Provider</em>) – <a href="http://cockmailwwfvrtqj.onion" rel="nofollow">http://cockmailwwfvrtqj.onion</a></li>
<li><strong>Onion Mail</strong> (<em>Email Provider</em>) – <a href="https://en.onionmail.info/directory.html" rel="nofollow">https://en.onionmail.info/directory.html</a> (<em>Clearnet, links to multiple instances hosted on Onions</em>)</li>
<li><strong>Mail2Tor</strong> (<em>Email Provider</em>) – <a href="http://mail2tor2zyjdctd.onion/" rel="nofollow">http://mail2tor2zyjdctd.onion/</a></li>
<li><strong>Guerilla Mail</strong> (<em>Temporary Burner Email Addresses</em>) –  <a href="http://grrmailb3fxpjbwm.onion/" rel="nofollow">http://grrmailb3fxpjbwm.onion/</a></li>
<li><strong>PrivacyTools</strong> (<em>Privacy Org. with Many Tools and Resources</em>) – <a href="http://www.privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/" rel="nofollow">http://www.privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/</a></li>
<li><strong>Snopyta</strong> (<em>Privacy Org. with Multiple Tools</em>) – <a href="http://cct5wy6mzgmft24xzw6zeaf55aaqmo6324gjlsghdhbiw5gdaaf4pkad.onion/" rel="nofollow">http://cct5wy6mzgmft24xzw6zeaf55aaqmo6324gjlsghdhbiw5gdaaf4pkad.onion/</a></li>
<li><strong>RiseUp Onion Services</strong> (<em>Privacy Org. with Multiple Tools</em>) –  <a href="http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion/en/security/network-security/tor#riseups-tor-onion-services" rel="nofollow">http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion/en/security/network-security/tor<a href="https://failsafe.writeas.com/tag:riseups" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">riseups</span></a>-tor-onion-services</a> (<em>Multiple Tools</em>)</li>
<li><strong>Systemli Onion Services</strong> (<em>Privacy Org. with Multiple Tools</em>) – <a href="http://7sk2kov2xwx6cbc32phynrifegg6pklmzs7luwcggtzrnlsolxxuyfyd.onion/en/service/onion.html" rel="nofollow">http://7sk2kov2xwx6cbc32phynrifegg6pklmzs7luwcggtzrnlsolxxuyfyd.onion/en/service/onion.html</a> (<em>Multiple Tools</em>)</li>
<li><strong>Calyx Institute</strong> (<em>Privacy Org. with Multiple Tools</em>) – <a href="http://ijeeynrc6x2uy5ob.onion" rel="nofollow">http://ijeeynrc6x2uy5ob.onion</a> (<em>Multiple Tools</em>)</li>
<li><strong>BBC News</strong> (<em>News</em>) – <a href="https://www.bbcnewsv2vjtpsuy.onion/" rel="nofollow">https://www.bbcnewsv2vjtpsuy.onion/</a></li>
<li><strong>Associated Press</strong> (<em>News</em>) – <a href="http://3expgpdnrrzezf7r.onion/" rel="nofollow">http://3expgpdnrrzezf7r.onion/</a></li>
<li><strong>The New York Times</strong> (<em>News</em>) – <a href="https://www.nytimes3xbfgragh.onion/" rel="nofollow">https://www.nytimes3xbfgragh.onion/</a></li>
<li><strong>ProPublica</strong> (<em>News</em>) – <a href="https://p53lf57qovyuvwsc6xnrppyply3vtqm7l6pcobkmyqsiofyeznfu5uqd.onion/" rel="nofollow">https://p53lf57qovyuvwsc6xnrppyply3vtqm7l6pcobkmyqsiofyeznfu5uqd.onion/</a></li>
<li><strong>Business Insider</strong> (<em>News</em>) – <a href="http://doaxi7t7lkctvq5i.onion/" rel="nofollow">http://doaxi7t7lkctvq5i.onion/</a></li>
<li><strong>Buzzfeed News</strong> (<em>News</em>) – <a href="https://bfnews3u2ox4m4ty.onion/" rel="nofollow">https://bfnews3u2ox4m4ty.onion/</a></li>
<li><strong>Internet Archive</strong> (<em>Archives</em>) – <a href="http://archivebyd3rzt3ehjpm4c3bjkyxv3hjleiytnvxcn7x32psn2kxcuid.onion/" rel="nofollow">http://archivebyd3rzt3ehjpm4c3bjkyxv3hjleiytnvxcn7x32psn2kxcuid.onion/</a></li>
<li><strong>Archive.is</strong> (<em>Archives</em>) – <a href="http://archivecaslytosk.onion" rel="nofollow">http://archivecaslytosk.onion</a></li>
<li><strong>OnionShare</strong> (<em>Software</em>) – <a href="http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion/" rel="nofollow">http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion/</a></li>
<li><strong>Mullvad VPN</strong> (<em>Software</em>) – <a href="http://xcln5hkbriyklr6n.onion" rel="nofollow">http://xcln5hkbriyklr6n.onion</a></li>
<li><strong>Tails</strong> (<em>Software</em>) – <a href="https://tails.boum.org/index.en.html" rel="nofollow">https://tails.boum.org/index.en.html</a></li>
<li><strong>Qubes OS</strong> (<em>Software</em>) – <a href="http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/" rel="nofollow">http://www.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/</a></li>
<li><strong>Whonix</strong> (<em>Software</em>) – <a href="http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/" rel="nofollow">http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/</a></li>
<li><strong>Debian</strong> (<em>Software</em>) <a href="http://sejnfjrq6szgca7v.onion/" rel="nofollow">http://sejnfjrq6szgca7v.onion/</a></li></ul>

<h3 id="directories" id="directories">Directories</h3>

<p>If you, like Booker T., find yourself needing mo&#39; onions, here are some good resources:</p>
<ul><li><a href="https://github.com/alecmuffett/real-world-onion-sites" rel="nofollow">Alec Muffett&#39;s Real World Onion Sites List</a> (<em>Clearnet</em>)</li>
<li><a href="https://en.wikipedia.org/wiki/List_of_Tor_onion_services" rel="nofollow">List of Tor Onion Services on Wikipedia</a> (<em>Clearnet</em>)</li>
<li><a href="https://www.reddit.com/r/onions/" rel="nofollow">/r/Onions on Reddit</a> (<em>Clearnet</em>)</li></ul>

<hr/>

<h2 id="sources-a-name-sources-a" id="sources-a-name-sources-a">Sources</h2>

<p><sup><strong>1</strong></sup> <a href="https://2019.www.torproject.org/about/overview.html.en" rel="nofollow">https://2019.www.torproject.org/about/overview.html.en</a></p>

<p><sup><strong>2</strong></sup> <a href="https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/" rel="nofollow">https://www.wired.com/2016/11/block-ultrasonic-signals-didnt-know-tracking/</a></p>

<p><sup><strong>3</strong></sup> <a href="https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/" rel="nofollow">https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/</a></p>

<p><sup><strong>4</strong></sup> <a href="https://www.cbsnews.com/news/google-removes-apps-that-use-ultrasonic-frequencies-to-track-users/" rel="nofollow">https://www.cbsnews.com/news/google-removes-apps-that-use-ultrasonic-frequencies-to-track-users/</a></p>

<hr/>

<h2 id="changes-a-name-changes-a" id="changes-a-name-changes-a">Changes</h2>

<p><strong>POSTED 10/19/2020</strong></p>
<ul><li><p>Edit 10/20/2020: <em>Added “Prioritize Onion Services” to the Configuring the Tor Browser section</em></p></li>

<li><p>Edit 10/19/2020: <em>Minor Formatting Revisions, added “Contact Me” section</em></p></li></ul>

<hr/>

<h2 id="contact-me" id="contact-me">Contact Me</h2>

<p>failsafeprivacy (at) protonmail (dot) ch (<a href="https://keys.openpgp.org/vks/v1/by-fingerprint/84B7247CEDBE198ABC1458C5EDC8B435D608658C" rel="nofollow">PGP</a>)
<a href="https://keyoxide.org/84B7247CEDBE198ABC1458C5EDC8B435D608658C" rel="nofollow">Keyoxide</a> | <a href="https://fosstodon.org/@failsafe" rel="nofollow">Mastadon</a> | <a href="https://www.reddit.com/user/Failsafe-Privacy" rel="nofollow">Reddit</a></p>

<hr/>

<h2 id="tags" id="tags">Tags</h2>

<p><a href="https://failsafe.writeas.com/tag:tutorial" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tutorial</span></a> <a href="https://failsafe.writeas.com/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://failsafe.writeas.com/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://failsafe.writeas.com/tag:browser" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">browser</span></a> <a href="https://failsafe.writeas.com/tag:tor" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">tor</span></a> <a href="https://failsafe.writeas.com/tag:software" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">software</span></a> <a href="https://failsafe.writeas.com/tag:opensource" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">opensource</span></a></p>
]]></content:encoded>
      <guid>https://failsafe.writeas.com/how-to-get-the-most-out-of-tor-in-2020</guid>
      <pubDate>Mon, 19 Oct 2020 18:39:52 +0000</pubDate>
    </item>
  </channel>
</rss>