Top products from r/privacy
We found 42 product mentions on r/privacy. We ranked the 128 resulting products by number of redditors who mentioned them. Here are the top 20.
1. How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life
Sentiment score: 2
Number of reviews: 4
Thomas Dunne Books
2. Mic-Lock Microphone Blocker (1 Pack) – Signal Blocking Device (3.5mm) for Laptops, Smartphones, Tablets, and Desktop Computers - Data Security, Privacy Protection, Counter Surveillance Equipment
Sentiment score: 0
Number of reviews: 3
KEEP CONVERSATIONS PRIVATE! Mic-Lock secures your device’s microphone input with proprietary semiconductor comes with a lifetime guarantee.PREVENTS CYBER ATTACKERS from using your microphone to listen in on you.THE ONLY ANTI-SPYING sound blocker on the market.COMPACT DESIGN with keychain attachmen...
3. Three Felonies A Day: How the Feds Target the Innocent
Sentiment score: -1
Number of reviews: 3
Encounter Books
4. Extreme Privacy: What It Takes to Disappear in America
Sentiment score: 1
Number of reviews: 2
5. Threat Modeling: Designing for Security
Sentiment score: 1
Number of reviews: 2
John Wiley Sons
6. Cell Phone Anti-Tracking Anti-Spying GPS RFID Signal Blocker Pouch Case Bag Handset Function Bag (Black)
Sentiment score: 0
Number of reviews: 2
High quality and perfect design, can be used as a wallet at the same time.Anti-radiation, anti-degaussing, anti-signal.Prevent people from being tracked with this bag, protect your privacy.If you don't want to answer the phone, you can put the phone in the bag,then the phone will tell "Calls can not...
7. Ska Direct 100% Anti-Tracking Anti-Spying GPS RFID Signal Blocker Pouch Case Bag Handset Function Bag for Cell Phone Privacy Protection and Car Key FOB (Pink)
Sentiment score: 1
Number of reviews: 2
High quality and perfect design, Can be used as a wallet at the same timeAnti-radiation,anti-degaussing,anti-signalPrevent people from being tracked with this bag,Protect your privacyIf you don't want to answer the phone,you can put the phone in the bag,then the phone will tell "Calls can not be con...
8. Mint Mobile Starter Kit | Verify Compatibility with Our Talk, Text & Data Plans (3-in-1 GSM SIM Card)
Sentiment score: 1
Number of reviews: 2
Our Starter Kit is an easy, worry-free way to try Mint Mobile out before committing to one of our phone plansFor just $5, we’ll send you two SIM cards—download our free Mint Mobile app to activate the first SIM and test Mint where you live, work, and playTrial includes 100MB of 4G LTE data, 100 ...
9. Nothing to Hide: The False Tradeoff between Privacy and Security
Sentiment score: 2
Number of reviews: 2
Used Book in Good Condition
10. The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Sentiment score: 1
Number of reviews: 2
Little Brown and Company
11. How to Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish Without A Trace
Sentiment score: 1
Number of reviews: 2
Lyons Press
12. iStorage datAshur 256-bit 4GB USB 2.0 secure encrypted flash drive IS-FL-DA-256-4
Sentiment score: 3
Number of reviews: 2
Military grade Full-disk AES 256-bit CBC Hardware EncryptionWorks with any USB/USB On-The-Go devicesDrive reset destroys data and recovers use of driveCompatibility with any OS - Windows, MAC, LinuxGuaranteed with 3 year warranty
13. Plugable USB Universal Fast 1A Charge-Only Adapter for Android, Apple iOS, and Windows Mobile Devices
Sentiment score: 2
Number of reviews: 2
The Plugable 'USB-MC1' adapter enables you to turn any USB data port in to a charge-only port. This can be advantageous as some devices charge too slowly or do not charge when connected to a USB data port. It also serves to protect your device and its data from hackers and viruses. The MC1 is smalle...
14. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Sentiment score: 1
Number of reviews: 1
W W Norton Company
16. Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watc h Your Every Move
Sentiment score: 0
Number of reviews: 1
17. The Mastermind: Drugs. Empire. Murder. Betrayal.
Sentiment score: 0
Number of reviews: 1
The Mastermind: Drugs. Empire. Murder. Betrayal. Hardcover – January 29, 2019
18. Fighting Traffic: The Dawn of the Motor Age in the American City (Inside Technology)
Sentiment score: 0
Number of reviews: 1
19. Unpopular Privacy: What Must We Hide? (Studies in Feminist Philosophy)
Sentiment score: 1
Number of reviews: 1
20. CanaKit Raspberry Pi 4 4GB Basic Starter Kit with Fan (4GB RAM)
Sentiment score: 1
Number of reviews: 1
Includes Raspberry Pi 4 4GB Model B with 1.5GHz 64-bit quad-core ARMv8 CPU (4GB RAM)CanaKit Premium Clear Raspberry Pi 4 Case, CanaKit Fan, Set of Heat SinksMicro HDMI to HDMI Cable - 6 foot (Supports up to 4K 60p)CanaKit 3.5A USB-C Raspberry Pi 4 Power Supply with Noise Filter - Specially designed ...
A basic step, if you're concerned, is to get a power-only USB or Lighting cable; or a "USB condom".
https://www.amazon.com/Plugable-Universal-Charge-Only-Adapter-Android/dp/B00FA9GXKM/
I think it's pretty unlikely that mass-produced battery packs include tracking/location/wireless tech - it would add to the cost of the device, reduce the power available, and provide very little information, most of the time (because cell phones are already tiny always-on location/wireless devices we carry with us all over the place).
On the other hand, intelligence agencies are known to interdict hardware ordered by parties of interest and install surveillance tech in just that specific device:
https://www.theverge.com/2013/12/29/5253226/nsa-cia-fbi-laptop-usb-plant-spy
If you're concerned about that, buy your device in person with cash - or have someone even less interesting than you buy it for you.
You could also look for one that's easy to disassemble, then open it up and see if there's any circuits that don't seem relevant to charging/discharging the battery.
>I am ok with a software solution but it would be really ideal if I could use the storage without needing to install additional software.
That's going to be difficult. You see stuff like this https://www.amazon.com/dp/B0061DBZ2C/ref=sspa_dk_hqp_detail_aax_0?psc=1 or https://www.amazon.com/Apricorn-Hardware-Encrypted-Portable-A25-3PL256-1000/dp/B007JGB0EI
but do you really want to trust a relatively unknown hardware producer?
Veracrypt seems like the obvious choice if you can waive the software requirement. Just partition your drive and add the veracrypt install utility on the unencrypted partition.
I would recomend you to read Future Crimes by Marc Goodman https://www.amazon.co.uk/Future-Crimes-Digital-Underground-Connected/dp/0552170801?SubscriptionId=AKIAILSHYYTFIVPWUY6Q&tag=duckduckgo-ffab-uk-21&linkCode=xm2&camp=2025&creative=165953&creativeASIN=0552170801 mostly deals with the non existence of electronic security though and how it is and can be exploited
Information and Corporate security is a very big subject, so it kind of depends where you intend to take your story. But you can start by reading the Wikipedia article about InfoSec https://en.wikipedia.org/wiki/Information_security and then see how each area fits into your story and work out from there.
Some realisim in how difficult it can be to track down a hacker, read The Cuckoo's Egg by Clifford Stoll
https://www.amazon.co.uk/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ref=sr_1_1?s=books&ie=UTF8&qid=1500888747&sr=1-1&keywords=clifford+stoll very different from what you see in the media
IMHO the most interesting area in Information security is Social Engineering, it requires cunning and skill, and sometimes you can't stop admiring the talents and genius of some of these people. Read Social Engineering: The Art of Human Hacking https://www.amazon.co.uk/Social-Engineering-Art-Human-Hacking/dp/0470639539/ref=sr_1_1?s=books&ie=UTF8&qid=1500889212&sr=1-1&keywords=social+engineering+the+art+of+human+hacking
Each year Verizon release their data breach report http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ it is free to download (don't have to register, just click the download only button) I think that is possibly the best insight you can get into corporate security challenges in 2017
It really depends on what you mean by "privacy." To wrap your head around all the different ways it's used, Dan Solove's article "A Taxonomy of Privacy" is a good read.
In general, Dan Solove's Nothing to Hide is definitely worth reading.
Robert O'Harrow's No Place to Hide is another good one.
Not books, but Peter Fleischer's blog, Bruce Schneier's blog, and Eugene Volokh's blog.
Also, privacy is kind of the flip-side of the free speech coin, so you'll want to read up on that. There are a bunch of authors that write about the privacy/free speech dichotomy, so here's a random list of various interesting things I've read recently: Eugene Volokh, Robert Larson, Anita Allen, Woodrow Hartzog, etc.
I don't know if there exist threat modeling for a single person but usually most of the materials online are at enterprise level or something to that level. Like those of certification materials Security+ and CEH v9 or other similar courses. It can somewhat give you an idea how you want to determine your threat model.
For courses, I like Nathan House's stuff from Udemy.
There are as well books that cover those topics but the pages can range around 200 to over 600 of pages. E.g. The Basics of Cyber Safety has 254 pages and Threat Modeling: Designing for Security has 624 pages.
You can check those also:
https://en.wikipedia.org/wiki/Threat_model
https://en.wikipedia.org/wiki/Threat_%28computer%29#Threat_model
Otherwise see conferences like DEF CON, Black Hat, CCC and similar topics. Here's my give away:
I hope that helps.
It's absolutely possible. Diaspora was a decentralized social network almost a decade ago. And end to end encrypted photo messaging services exist too, all over the place: signal, ichat, WhatsApp... Hell, even bittorrent is encrypted now.
NAT doesn't make this hard since the advent of upnp several years ago.
We have the technology. The issue is the market and legal situations. Problems like
If you're interested in the subject I highly recommend Bruce Schneier's book, Data and Goliath. An eye opening book from one of the most important people in the industry.
MySudo if you have iOS
If you're in the US, you can get 2 Mint Mobile sim cards for $5 (total) on Amazon. Trial includes 100MB of 4G LTE data, 100 text messages, and 100 minutes of talk—all of which is good for 7 days after activation. This is fantastic because it's a real phone number with a real carrier so it will bypass any system vetting VoIP/temp numbers.
https://www.amazon.com/Mint-Mobile-Starter-Verify-Compatibility/dp/B0786RD524
This is the most comprehensive online guide I've found.
> http://billstclair.com/matrix/
Also good reads..
> How to Be Invisible by JJ Luna
> How to Disappear by Frank M. Ahearn
probably OK, but if you're worried you can pick up something like this, which are often referred to as "usb condoms". they actually manually strip the data connection part and force it to be truly charge-only. (usb's have 4 pins, two for data two for charging, and this just doesn't connect the two data pins)
> I am not afraid of the lurning curve, just those two problems.
You should look at running Nextcloud on a Raspberry Pi (4 4GB), which you can get as a ready to run kit for $89. Just add your storage device. I haven't installed NC yet, instead use it as a backup and remote access device. HTH and good luck.
Saw your edit.
Seems like things such as this or this may be the best options given I want portability.
Would you say they might be better options? Their price is much higher, but I'm considering the first one I linked.
Here's a faraday case for your phone. Works great!
Try this one: http://www.amazon.com/Nothing-Hide-Tradeoff-between-Security/dp/0300172338
It's not about any particular technology, but it helps debunk one of the most baseless but infuriatingly-prevalent misconceptions about privacy: that being that "If you've done nothing wrong, you have nothing to hide."
I've read several privacy books and this one is the best by far https://www.amazon.com/Extreme-Privacy-Takes-Disappear-America/dp/1093757620
This guy is regarded as the expert. I haven't bought it yet, and likely will never be up to his level - still instructive:
https://www.amazon.com/dp/1093757620/ref=as_li_ss_tl?ie=UTF8&linkCode=sl1&tag=hookaround-20&linkId=7882161bc8183001fe35c288262e9573&language=en_US#customerReviews
He's ex-FBI. Clearly he believes citizens now have a problem.
Wish I could find that article where a writer describes how her father torments TSA people when she travels. He was a gunner on the USS Missouri in WWII. His hearing is not so great....but his humor is still intact and vicious.
Some recommended workarounds for using Instagram without having to worry about privacy:
- if you're using a Mac, you could download the app Grids - it allows you to use Instagram (all the features) on your desktop computer: https://apps.apple.com/us/app/grids-for-instagram/id963509558?mt=12
​
If you're concerned about IG's microphone listening to you, you could do like me. I only have Instagram installed on a 6 year old iPad Mini, which I keep at home (not on the phone I carry with me everywhere). I use a "mic lock" accessory that cuts off access to the microphone: https://www.amazon.com/Mic-Lock-Microphone-Blocker-Pack-Surveillance/dp/B01LPQJGA2 And naturally the device has tape over its cameras.
Some of the chapters from this and this might be useful to you
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380504
An easy read is Kevin Mitnicks "The art of Invisibility". It goes into some shallow concepts of privacy and what you can do to stay private in an ever snooping world.
https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380504
$5 for two working sim cards. Each one comes with a trial amount that is just enough to get you started with a verification services. I recommend using the sim when you need to register/verify a couple different accounts and then throwing away the sim.
Here's a link.
I'd also recommend JJ Luna's book called Hiding from the Internet.
Quite a few options on amazon, I got this one and plan on getting larger bags when I have the budget.
Depending on how much you want to spend, you can get a tablet case, briefcase, or dufflebag. Don't get the flimsy mylar-looking bags, the won't pass the phone call test.
I ran across this online magazine series based on the book, The Mastermind, by Evan Ratliff. Amazon link, or check out your local independent bookstore or your public library!
Truth can be stranger than fiction, and to anyone wondering whatever happened behind the scenes that resulted in TrueCrypt being mysteriously pulled, this reporter's excellent work points to how and why.
Err, and also is a cautionary tale of how sometimes folks in the security community can be really freaken' weird when you look closer.
>Paul Calder Le Roux was once known online for helping build one of the world’s most significant pieces of encryption software, and then, in the mid-2000s, he poured his technical talents into an Internet pharmacy business, selling prescription drugs to Americans. That operation, according to the Department of Justice, earned hundreds of millions of dollars. Le Roux then directed his money into a broad portfolio of criminal concerns around the world: cocaine dealing, arms dealing, gold and timber smuggling, money laundering, and selling technology to pariah states. In the course of business, he’d arranged the murder of at least half a dozen people that I could name.
>For two years, I have been following the strange saga of Le Roux and the constellation of criminal prosecutions that surrounds him. I have traveled to the Philippines and Israel, connected with sources deep within Le Roux’s former criminal empire, and obtained exclusive documents revealing Le Roux’s background, his operations, and his cooperation with U.S. authorities.
>On March 10, The Atavist Magazine will launch “The Mastermind,” a seven-week series following Le Roux’s rise, his downfall, and his turn as a U.S. informant.
It's a longer series, but well worth the read.
https://www.amazon.com/How-Disappear-Digital-Footprint-without/dp/1599219778
Read this book (preferably get it from a public library so that you don’t have an obvious purchase record for it.) It’s written by a former skiptracer and should give you enough of an idea of what it means to disappear along with actual instructions on what to do. It’s also the book that got me interested in the topic of privacy, so there’s that...
You can check this book : How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life. This book has full guides how to be anonymously for our physical and digital. There's one reviewer say that this book takes you too extremist about privacy in life, but I think you can choose the method of this book offer where you like to try or useless.
camera cover
mic lock
https://www.amazon.com/Black-Hole-Faraday-Bag-Anti-tracking/dp/B0091WILY0
https://www.amazon.com/FawkesBOX-Smart-phone-Faraday-Shield/dp/B00QQUQTV2
https://www.amazon.com/Anti-tracking-Anti-spying-Blocker-Handset-Function/dp/B00ITR3KCQ
https://micahflee.com/2015/11/some-thoughts-on-faraday-bags-and-operational-security/
http://www.teeltech.com/mobile-device-forensics-equipment/disklabs-faraday-bags/
https://www.disklabs.com/faraday-bags/
http://killyourphone.com/
http://www.popsci.com/gadgets/article/2013-08/how-protect-yourself-your-phone
Perhaps instead of a blacklist of apps that would need constant updating, Edward Snowden's idea of an external case that monitors phone output (cellular, GPS, wi-fi and Bluetooth ) and indicates whether phone is communicating without user's authorization.
https://mysteriousuniverse.org/2016/07/hacktivists-design-untraceable-anti-surveillance-phone-case/
A $150 version:
https://www.privacycase.com/products/privacycase-mini-scif
or if you are willing to invest $10
https://www.amazon.com/Anti-tracking-Anti-spying-Blocker-Handset-Function/dp/B00ITR3KCQ
Tracking drivers via phones has been going on a long time. See this old New Scientist article from 2003.
Of course, toll tags are another tracking method. There are RFID tag readers along highways that monitor drivers beyond the toll booths to get those live traffic congestion pics. See Spychips chapter 11.
https://www.amazon.com/Three-Felonies-Day-Target-Innocent/dp/1594035229
There's also a book https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998
It's probably a very good approximation:
The average American inadvertently commits three felonies a day.
>I think people should use crosswalks... regardless of camera coverage. If you don't and you get hit by a car, it's your own fault and it should come out of the pedestrians pocket.
http://smile.amazon.com/Fighting-Traffic-American-Inside-Technology/dp/0262141000
You have a point, but only because the breadth of law practically guarantees that everyone is guilty of something.
Covering a microphone will do very little. It will also severely restrict your ability to actually use the phone as an actual phone if you do a good enough job of blocking sound from being picked up by the microphone.
A good solution is a mic disabling headphone jack device. It plugs into your headphone jack and sends a signal to the phone telling it that you are using a handsfree device so that the on-board mic is disabled. The device has no mic and so there is no audio being received, and yet the phone thinks that the handsfree kit is working.
https://www.amazon.com/Mic-Lock-Microphone-Blocker-Pack-Surveillance/dp/B01LPQJGA2