Top products from r/privacy

We found 42 product mentions on r/privacy. We ranked the 128 resulting products by number of redditors who mentioned them. Here are the top 20.

Next page

Top comments that mention products on r/privacy:

u/0cd35a70 · 3 pointsr/privacy

A basic step, if you're concerned, is to get a power-only USB or Lighting cable; or a "USB condom".

I think it's pretty unlikely that mass-produced battery packs include tracking/location/wireless tech - it would add to the cost of the device, reduce the power available, and provide very little information, most of the time (because cell phones are already tiny always-on location/wireless devices we carry with us all over the place).

On the other hand, intelligence agencies are known to interdict hardware ordered by parties of interest and install surveillance tech in just that specific device:

If you're concerned about that, buy your device in person with cash - or have someone even less interesting than you buy it for you.

You could also look for one that's easy to disassemble, then open it up and see if there's any circuits that don't seem relevant to charging/discharging the battery.

u/ashconnor · 3 pointsr/privacy

>I am ok with a software solution but it would be really ideal if I could use the storage without needing to install additional software.

That's going to be difficult. You see stuff like this or

but do you really want to trust a relatively unknown hardware producer?

Veracrypt seems like the obvious choice if you can waive the software requirement. Just partition your drive and add the veracrypt install utility on the unencrypted partition.

u/m7tq · 1 pointr/privacy

I would recomend you to read Future Crimes by Marc Goodman mostly deals with the non existence of electronic security though and how it is and can be exploited

Information and Corporate security is a very big subject, so it kind of depends where you intend to take your story. But you can start by reading the Wikipedia article about InfoSec and then see how each area fits into your story and work out from there.

Some realisim in how difficult it can be to track down a hacker, read The Cuckoo's Egg by Clifford Stoll very different from what you see in the media

IMHO the most interesting area in Information security is Social Engineering, it requires cunning and skill, and sometimes you can't stop admiring the talents and genius of some of these people. Read Social Engineering: The Art of Human Hacking

Each year Verizon release their data breach report it is free to download (don't have to register, just click the download only button) I think that is possibly the best insight you can get into corporate security challenges in 2017

u/Alrik · 3 pointsr/privacy

It really depends on what you mean by "privacy." To wrap your head around all the different ways it's used, Dan Solove's article "A Taxonomy of Privacy" is a good read.

In general, Dan Solove's Nothing to Hide is definitely worth reading.

Robert O'Harrow's No Place to Hide is another good one.

Not books, but Peter Fleischer's blog, Bruce Schneier's blog, and Eugene Volokh's blog.

Also, privacy is kind of the flip-side of the free speech coin, so you'll want to read up on that. There are a bunch of authors that write about the privacy/free speech dichotomy, so here's a random list of various interesting things I've read recently: Eugene Volokh, Robert Larson, Anita Allen, Woodrow Hartzog, etc.

u/86rd9t7ofy8pguh · 2 pointsr/privacy

I don't know if there exist threat modeling for a single person but usually most of the materials online are at enterprise level or something to that level. Like those of certification materials Security+ and CEH v9 or other similar courses. It can somewhat give you an idea how you want to determine your threat model.

For courses, I like Nathan House's stuff from Udemy.

There are as well books that cover those topics but the pages can range around 200 to over 600 of pages. E.g. The Basics of Cyber Safety has 254 pages and Threat Modeling: Designing for Security has 624 pages.

You can check those also:

Otherwise see conferences like DEF CON, Black Hat, CCC and similar topics. Here's my give away:

u/OhTheHugeManatee · 3 pointsr/privacy

It's absolutely possible. Diaspora was a decentralized social network almost a decade ago. And end to end encrypted photo messaging services exist too, all over the place: signal, ichat, WhatsApp... Hell, even bittorrent is encrypted now.

NAT doesn't make this hard since the advent of upnp several years ago.

We have the technology. The issue is the market and legal situations. Problems like

  • the US and UK governments hacking into Internet infrastructure to record every byte sent or received... With legal backing.
  • the US government actively inserting backdoors into encryption methods and products.
  • EU governments requiring companies to scrub information from the Internet, as if that was even possible.
  • legal frameworks that allow your information to be collected, combined, and resold without your involvement. Data brokerage is one of the fastest growing industries in the world right now, and you've never heard of any of the main players (Rubicon project, AdSonar, Quantcast...) . These are companies who know every website you've ever visited (thanks ISP for selling that info), every search you've ever tried (thanks google), every product you've bought from every store (thanks credit card company) , every location you've ever been (thanks phone vendor), your entire address book and friends list (thanks phone apps). They sell your information as a part of lists like "new parents", "recently broken up," "behind on payments", and "gullible seniors." And you're not within shouting distance of even knowing about this. The only things that are off limits are the ones with legal protections: financial and medical information.
  • 90% of users do not understand or care about the difference between encrypted and not encrypted products.
  • 90% of users don't understand when their data is being read at all - they think Facebook private messages are private, and email is private, and SMS is private...

    If you're interested in the subject I highly recommend Bruce Schneier's book, Data and Goliath. An eye opening book from one of the most important people in the industry.
u/gimtayida · 1 pointr/privacy

MySudo if you have iOS

If you're in the US, you can get 2 Mint Mobile sim cards for $5 (total) on Amazon. Trial includes 100MB of 4G LTE data, 100 text messages, and 100 minutes of talk—all of which is good for 7 days after activation. This is fantastic because it's a real phone number with a real carrier so it will bypass any system vetting VoIP/temp numbers.

u/ydnar · 3 pointsr/privacy

This is the most comprehensive online guide I've found.

Also good reads..
> How to Be Invisible by JJ Luna

> How to Disappear by Frank M. Ahearn

u/7trXMk6Z · 1 pointr/privacy

probably OK, but if you're worried you can pick up something like this, which are often referred to as "usb condoms". they actually manually strip the data connection part and force it to be truly charge-only. (usb's have 4 pins, two for data two for charging, and this just doesn't connect the two data pins)

u/archover · 1 pointr/privacy

> I am not afraid of the lurning curve, just those two problems.

You should look at running Nextcloud on a Raspberry Pi (4 4GB), which you can get as a ready to run kit for $89. Just add your storage device. I haven't installed NC yet, instead use it as a backup and remote access device. HTH and good luck.

u/Ryanjtombs · 1 pointr/privacy

Saw your edit.

Seems like things such as this or this may be the best options given I want portability.

Would you say they might be better options? Their price is much higher, but I'm considering the first one I linked.

u/2005C · 1 pointr/privacy

Here's a faraday case for your phone. Works great!

u/celticwhisper · 1 pointr/privacy

Try this one:

It's not about any particular technology, but it helps debunk one of the most baseless but infuriatingly-prevalent misconceptions about privacy: that being that "If you've done nothing wrong, you have nothing to hide."

u/maosredbrook · 2 pointsr/privacy

This guy is regarded as the expert. I haven't bought it yet, and likely will never be up to his level - still instructive:

He's ex-FBI. Clearly he believes citizens now have a problem.

Wish I could find that article where a writer describes how her father torments TSA people when she travels. He was a gunner on the USS Missouri in WWII. His hearing is not so great....but his humor is still intact and vicious.

u/mamiya220 · 1 pointr/privacy

Some recommended workarounds for using Instagram without having to worry about privacy:

- if you're using a Mac, you could download the app Grids - it allows you to use Instagram (all the features) on your desktop computer:


If you're concerned about IG's microphone listening to you, you could do like me. I only have Instagram installed on a 6 year old iPad Mini, which I keep at home (not on the phone I carry with me everywhere). I use a "mic lock" accessory that cuts off access to the microphone: And naturally the device has tape over its cameras.

u/1984utopia · 1 pointr/privacy

Some of the chapters from this and this might be useful to you

u/chewaccajedi · 2 pointsr/privacy

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

u/jaxupaxu · 3 pointsr/privacy

An easy read is Kevin Mitnicks "The art of Invisibility". It goes into some shallow concepts of privacy and what you can do to stay private in an ever snooping world.

u/torku · 2 pointsr/privacy

$5 for two working sim cards. Each one comes with a trial amount that is just enough to get you started with a verification services. I recommend using the sim when you need to register/verify a couple different accounts and then throwing away the sim.

Here's a link.

u/180K · 1 pointr/privacy

Quite a few options on amazon, I got this one and plan on getting larger bags when I have the budget.

Depending on how much you want to spend, you can get a tablet case, briefcase, or dufflebag. Don't get the flimsy mylar-looking bags, the won't pass the phone call test.

u/trai_dep · 9 pointsr/privacy

I ran across this online magazine series based on the book, The Mastermind, by Evan Ratliff. Amazon link, or check out your local independent bookstore or your public library!

Truth can be stranger than fiction, and to anyone wondering whatever happened behind the scenes that resulted in TrueCrypt being mysteriously pulled, this reporter's excellent work points to how and why.

Err, and also is a cautionary tale of how sometimes folks in the security community can be really freaken' weird when you look closer.

>Paul Calder Le Roux was once known online for helping build one of the world’s most significant pieces of encryption software, and then, in the mid-2000s, he poured his technical talents into an Internet pharmacy business, selling prescription drugs to Americans. That operation, according to the Department of Justice, earned hundreds of millions of dollars. Le Roux then directed his money into a broad portfolio of criminal concerns around the world: cocaine dealing, arms dealing, gold and timber smuggling, money laundering, and selling technology to pariah states. In the course of business, he’d arranged the murder of at least half a dozen people that I could name.

>For two years, I have been following the strange saga of Le Roux and the constellation of criminal prosecutions that surrounds him. I have traveled to the Philippines and Israel, connected with sources deep within Le Roux’s former criminal empire, and obtained exclusive documents revealing Le Roux’s background, his operations, and his cooperation with U.S. authorities.

>On March 10, The Atavist Magazine will launch “The Mastermind,” a seven-week series following Le Roux’s rise, his downfall, and his turn as a U.S. informant.

It's a longer series, but well worth the read.

u/firstworldobserver · 2 pointsr/privacy

Read this book (preferably get it from a public library so that you don’t have an obvious purchase record for it.) It’s written by a former skiptracer and should give you enough of an idea of what it means to disappear along with actual instructions on what to do. It’s also the book that got me interested in the topic of privacy, so there’s that...

u/alsalahad · 4 pointsr/privacy

You can check this book : How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life. This book has full guides how to be anonymously for our physical and digital. There's one reviewer say that this book takes you too extremist about privacy in life, but I think you can choose the method of this book offer where you like to try or useless.

u/GrinninGremlin · 29 pointsr/privacy

Perhaps instead of a blacklist of apps that would need constant updating, Edward Snowden's idea of an external case that monitors phone output (cellular, GPS, wi-fi and Bluetooth ) and indicates whether phone is communicating without user's authorization.

A $150 version:

or if you are willing to invest $10

u/LizMcIntyre · 2 pointsr/privacy

Tracking drivers via phones has been going on a long time. See this old New Scientist article from 2003.

Of course, toll tags are another tracking method. There are RFID tag readers along highways that monitor drivers beyond the toll booths to get those live traffic congestion pics. See Spychips chapter 11.

u/[deleted] · 1 pointr/privacy

>I think people should use crosswalks... regardless of camera coverage. If you don't and you get hit by a car, it's your own fault and it should come out of the pedestrians pocket.

u/shaunc · 4 pointsr/privacy

You have a point, but only because the breadth of law practically guarantees that everyone is guilty of something.

u/LazyByte_ · 3 pointsr/privacy

Covering a microphone will do very little. It will also severely restrict your ability to actually use the phone as an actual phone if you do a good enough job of blocking sound from being picked up by the microphone.

A good solution is a mic disabling headphone jack device. It plugs into your headphone jack and sends a signal to the phone telling it that you are using a handsfree device so that the on-board mic is disabled. The device has no mic and so there is no audio being received, and yet the phone thinks that the handsfree kit is working.