botherder / resist-the-internet
Leave no chance to Surveillance Capitalism and let this extension make decisions for you
☆29Updated 6 years ago
Alternatives and similar repositories for resist-the-internet:
Users that are interested in resist-the-internet are comparing it to the libraries listed below
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆34Updated 9 years ago
- ☆8Updated 4 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- The web site☆15Updated last year
- Tips to protect your personal and company data☆28Updated 4 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- Browser extension that complements the PhishDetect service☆22Updated 2 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆21Updated 8 years ago
- security in a box - tools and tactics for your digital security☆19Updated 9 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- An application that helps you notify your friends and/or family if you've gone missing.☆11Updated 8 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Updated 13 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- a collection of teaching resources☆12Updated 7 years ago
- quotes i like.☆14Updated 5 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆18Updated 8 years ago
- Spot the Surveillance is an open-source educational VR tool to help people identify street-level surveillance in their community. As each…☆35Updated 4 years ago
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- ☆15Updated 8 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Qubes component: app-linux-pdf-converter☆55Updated last month
- A Passive DNS backend and collector☆31Updated 2 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- lepidopter: raspberry pi image for conducting OONI network measurements☆49Updated 5 years ago
- A user-first approach to threat modeling.☆16Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago