Recommended software to increase privacy

6 May 2023 3 minutes Author: D2-R2

Having received understanding in these terms we will start analysis of how to increase the privacy in a network

For the first time, be careful about social networks and the information you publish, remember what got into the network there forever and apply the rules of cyber hygiene. (Make OSINT (What is it? Search the site). And now let’s move on to the most interesting, namely the programs that are recommended to use. I hope you know what privacy is, and if not, I recommend reading the articles on the site in the section”Privacy”, this also applies to understanding the difference between proprietary software and free software, so now let’s look at software (ie programs) that will help raise the level privacy and be more private online. But first again, a theory to understand – consider the difference between the concepts. Anonymity, Privacy and Security (because they seem so similar ..) Anonymity is when no one knows who you are but potentially sees what you are doing, but privacy is when no one sees what you are doing but potentially knows who are you If privacy is a working tool for democracy, then anonymity is a tool for self-preservation. In small doses, both tools are definitely useful.

But it is worth overdoing with these sensitive indicators of social freedoms, and the terry color of conspiracy will begin to cover everything related to a person’s private life. Using the possibilities of privacy and anonymity, one must see the boundary that separates freedom from permissiveness. When the line is met, the usefulness of both tools is undeniable. Feelings of impunity have never led to good. Anonymous access to some sites allows individuals to cross the thin line of permissiveness. You can never forget about safety no matter what you do. Security is when you want to preserve your reputation, not hide your identity. The best Internet security software protects against a number of threats, including hacking, viruses, and malware. An integrated online security product should detect device vulnerabilities, block cyber threats until they spread, and isolate and eliminate immediate threats.

Services for checking and improving privacy in the network

Privacy with photos and videos

Exif2xml

Click here

ExifTool 

Click here

Use apps to remove metadata from the photos and videos you share, and smartphones, cameras, and other devices store a wealth of information at the time of shooting, which you can analyze to determine the device, author, and location.

Private messengers

Threema


Click here

Signal


Click here

Use encryption messengers that use public encryption algorithms, such as messengers.

Private search engines

DuckDuckGO


click here

Tor browser


Click here

Use search engines without tracking.

Using a VPN

ProtonVPN


Click here

NordVPN


Click here

1.1.1.1


Click here

(Українська)

Використовуйте Virtual Private Network (далі – VPN) для захисту свого мережевого трафіку від перехоплення та модифікації.

Use Virtual Private Network (VPN) to protect your network traffic from interception and modification.

ProtonVPN


Click here

Bitwarden


Click here

KeePass


Click here

Use strong passwords, meaning the use of an alphanumeric / character password. (“Each service is a new password”)

Use UNIX-like operating systems for your PC (also has an OS with a bias against security and anonymity)

ParrotOS


Click here

Ubuntu


Click here

LinuxMint


Click here

Anti-detection browsers

GoLogin browser


Click here

Sphera browser


Click here

Incogniton browser


Click here

Indigo browser


Click here

Use anti-detection browsers, search engines generate a digital fingerprint of the device so you need to protect yourself

This is not a complete list of software, it will be updated later.

Other related articles
Personal safetyPrivacy
Read more
The best Linux distributions
The article provides a reteThe article provides a carefully selected list of the best Linux distributions. The list contains a detailed description of each Linux distribution with key features. A handpicked list of the best Linux distributions. The list contains a detailed description of each Linux distribution with key features.
470
Found an error?
If you find an error, take a screenshot and send it to the bot.