Skip to content Skip to sidebar Skip to footer

Despite their dominance in the digital world, large data-hungry corporations treat your personal information with scant or no respect. Stopping companies, governments, and hackers from logging, storing, or selling your personal data is easier if you use open-source applications.

Password Managers

SoftwareDescription
BitWardenOpen source password manager with cloud-sync features. Client apps for desktop, web, and mobile make BitWarden simple to use.
KeePassPassword manager that’s both secure and offline.. As the gold standard for safe password managers, it lacks cloud-sync integration. You can find more KeePass clients and extensions like KeePassDX (Android) and KeeWeb (Web-based/self-hosted).
LessPass (Self-Hosted)When you use LessPass, your passwords are generated using a hash of your username, website name, and a single master-passphrase. As a result, there is no need for you to store or sync your passwords ever again. You can host it yourself or use their apps and CLI on all major platforms.
PadlocPassword manager for individuals and teams that is open source and modern stunningly beautiful and easy to use.

Bruce Schneier created Password Safe, an open-source, offline password manager with native apps for Windows, Linux, MacOS, Android, and iOS, as well as YubiKey support. In comparison to other options, the interface is a little dated and there is no official browser extension, making it a little less convenient to use

PassBolt is an excellent choice for teams. A free, open source, self-hosted, extensible, and OpenPGP-based service is available for use. For development and DevOps use, it has integrations for the terminal, browser and chat. It can be easily extended for custom use and can be quickly deployed with Docker.

1Password (proprietary) is a cross-platform password manager with sync that offers comprehensive functionality. If you’re hosting your own data, it’s free. Despite the fact that 1Password isn’t completely open source, they have a solid reputation for openly disclosing and fixing flaws in their security measures.

2-Factor Authentication

SoftwareDescription
Aegis (Android)Authenticator app for Android that is free, secure, and open source. Has a backup and restore feature, as well as a dark mode for the UI.
Authenticator Pro (Android)A two-factor authentication app for Android that is free and open source. In addition to encryption, the software offers a wide range of icon, category, and customization options. In addition, there’s a Wear OS app for it.
Tofu (iOS)The most user-friendly and open-source two-factor authentication app for iOS
Authenticator (iOS)Intuitive two-factor authentication client for iOS that never connects to the internet
Raivo OTP (iOS)One-time password (OTP) client for iOS that is lightweight and secure
WinAuth (Windows)An encrypted desktop authenticator app for Windows that can be carried around with you wherever you go. WinAuth is an excellent desktop authenticator for power users, thanks to its many useful features, including hotkeys and a few extra security tools. It is free and well-known (since mid-2010)
Authenticator (Linux)OTP authenticator written in Rust. Has native integration with the GNOME Shell

File Encryption

SoftwareDescription
VeraCryptOpen-source disk encryption software VeraCrypt is available for both Windows and Linux. Encrypting a single file or directory, or an entire partition of the disk, is possible. With its extensive encryption options and user-friendly interface, VeraCrypt is an excellent choice for encrypting your data. It comes in both a CLI and a portable form. This is the successor to TrueCrypt, which has been deprecated.
CryptomatorAn open source client-side encryption tool for cloud files, Cryptomator preserves the structure of individual files while encrypting them on the client side. Like VeraCrypt, it is simple to use, but it does not offer as many technical options for how the data is encrypted. Cryptomator is available for Windows, Linux, and Mac, as well as for smartphones and tablets.
ageage is a CLI file encryption tool and Go library that is simple, modern, and secure. It has no configuration options, small explicit keys, and UNIX-style composability.

Internet Browsers

ProviderDescription
LibrewolfA “fork” of Firefox, Librewolf aims to improve privacy, security and user freedom. As LibreFox’s heir apparent, this is the new open-source alternative.
Brave BrowserAs one of the most popular private browsers, Brave blocks trackers and has a minimalistic interface, making it fast, secure, and private. BAT tokens are also paid out to you for using it. When you open a private tab/window in Brave, you’ll automatically be connected to Tor.
FirefoxSignificantly more private than Chrome, Internet Explorer, and Safari, as well as some useful privacy features. After you’ve installed Firefox, you’ll need to make a few minor adjustments to make it more secure.
Tor BrowserYour requests are encrypted and routed through several nodes, making it near-impossible for your ISP/provider to track you, thanks to Tor. There is a noticeable slowdown in everyday browsing and some websites may not function properly.
BromiteSecurity and privacy-focused Android version of Chromium. Adblock and hardening options are included in the package..

Internet Search Engines

SoftwareDescription
DuckDuckGoDuckDuckGo is a search engine that is easy to use, quick to load, and safe to use. There are no trackers, cookies, or ads on this site. It also has a dark mode, multiple languages, and a wide range of other options.
QwantIt is a French service that combines the results of Bing with its own. Cookies, trackers, or third-party advertising are not used by Quant. Non-promotional search results are returned.
StartpageA Dutch search engine that uses Google to retrieve search results. It can be configured in a variety of ways to ensure privacy while in use (it is not open source)

Encrypted Email

SoftwareDescription
ProtonMailEncrypted end-to-end anonymous email sent via open-source code. In addition to a modern, user-friendly and customisable user interface, ProtonMail has a fast and secure native mobile app. It has all of the bells and whistles of a modern email service while maintaining a high level of security and simplicity. It offers a free plan as well as a premium option (starting at $5/month) for using custom domains. Signing up for ProtonMail requires no personal information, and they have a.onion server for Tor access, as well as accepting anonymous payment in Bitcoin and cash (in local currencies) (as well as the normal credit card and PayPal).
TutanotaEmail service that is free and open source and based in Germany. You can sign up anonymously and use the secure native mobile apps without having to give any personal information. Tutonota offers a free, full-featured plan as well as a $12/month premium subscription for businesses that want to use their own domains.
Instead of using OpenPGP, Tutanota uses a symmetrical and asymmetrical algorithm to encrypt their messages, unlike most email providers (with 128 bit AES, and 2048 bit RSA).
MailfenceAs a result of the OpenPGP support provided by Mailfence, you have complete control over your own encryption keys. In addition to a calendar, address book, and files, Mailfence has an easy-to-use UI. All of the mail settings are highly customizable, but they are also simple to use. It is not possible to sign up anonymously because you must provide your name and a previous email address.
MailBox.org€12/year. A catch-all alias is an option with your own domain. With OpenPGP and encrypted storage, they offer strong account security and email encryption. The service does not have its own app, but it is compatible with any standard email client that supports SSL.

Virtual Phone Numbers

ProviderDescription
Silent.linkSMS, incoming calls, and 4G/ 5G internet are all possible with an anonymous eSIM. At the time of registration, no personal information is required. Bitcoin payments and top-ups are accepted at a reasonable price. An eSIM-enabled device is required.
Crypton.shSending and receiving SMS messages via a cloud-based physical SIM card. Your private key is used to encrypt messages. Use it on any device with a web browser or an API to get started. Paying with Bitcoin, XMR or a credit card costs around €7.00 per month.
Jmp.chatSoprani has provided a phone number for both incoming and outgoing calls and messages. Works with any SIP client, including Jabber, Matrix, Snikket, and XMPP. Pricing begins at $2.99 a month for a single user. As of 2022, the service is only available in the United States and Canada, as it is still in Beta.

Internet Tools

Software Description
Have i been pwnedCan verify whether your email or password has been compromised as a result of a recent data breach.
εxodusThe number and type of trackers that an Android app has can be found using this tool. Before you install an APK, it’s helpful to know how the app collects data and which permissions it requests.
Am I Unique?Using your device’s information, create a fingerprint that can be used to identify you on the Internet. Even if you don’t have cookies enabled on your browser, many websites track you this way.
PanopticlickYour browser should be protected from tracking. Examines the security of your browser and add-ons against online tracking and the uniqueness of your system’s configuration, making it possible to track you down.
Phish.lyAnalysis of emails, URL checks, hashing of attachments (using SHA256 and MD5), and an embedded link to virustotal.com are all included.
Browser Leak TestYou can better protect yourself from fingerprinting if you know what personal information is being leaked through your browser.
IP Leak TestDisplays information about your computer’s location and its IP address (location, ISP, WebRTC check, DNS, and lots more)
EXIF RemoveMeta and EXIF data from an uploaded image or document is displayed and removed.
Redirect DetectiveBe on the lookout for where a suspicious URL redirects (without having to click it). Useful if you don’t want to end up being tracked by adware/tracking websites and want to verify that the link you’re clicking on actually goes to a legitimate site, or that it is an affiliate link.
Blocked.orgChecks to see if a particular website is blocked by your Internet Service Providers’ filters (ISP)
Virus TotalDetects malware based on URL, IP, domain, or file hash analysis of suspicious web resources (files are scanned publicly)
HardenizeScan websites and provide an overview of their security, including information on HTTPS, domain names, email addresses, and the www protocol, among other things.
Is Legit?Before making a purchase from a company or website, make sure it is not a scam.
Deseat MeYou can use this tool to help you clean up your online presence Get a list of all your accounts and delete the ones you don’t use right away.
Should I Remove It?When you’re trying to remove software from your Windows PC, have you ever been baffled by what you’re getting rid of? Is It Time to Remove Software that is essential, harmless or dangerous is listed in a database that can be accessed by anyone.
10 Minute MailCreates a temporary email address so that you don’t have to give out your real information.
MXToolBox Mail HeadersAn email header analysis tool that can be used to verify the authenticity of messages and determine what personal information you are disclosing in your outgoing communications.
Am I FloCed?For the first time in the company’s history, Google is experimenting with a new feature called Federated Learning of Cohorts (aka “FLoC”). The EFF has developed a tool that can detect if you are one of the 0.5 percent of Chrome users who are vulnerable and provide additional information on how to protect yourself.
Site ReportNetcraft’s tool for analyzing any given website’s operating system, location, host, registrar, IP, and SSL certificate.

Conclusion

Data collection and privacy exploitation are common practices at many large corporations that prioritize their bottom line over the well-being of their customers. It’s impossible to know if they’re safe until there’s been a breach, and by then it’s too late. You can significantly improve your security, privacy, and anonymity online by switching to open-source software.

Nevertheless, that isn’t the only thing you must do. Use strong and unique passwords, two-factor authentication, good networking practices, and be aware of data that is collected while browsing the web are also important. In addition to these tips, you can check out the full Personal Security Checklist.

A few things to keep in mind

There isn’t a single piece of software out there that can guarantee your privacy or security. Additional to this, software can only function properly when it is running on a secure operating system. Because new vulnerabilities and patches are continually being found, it is imperative that you keep your system up to date. In the event of a breach, divide your data into sections to minimize damage. Good security practices are as important as using secure software.

Leave a comment

> Newsletter <
Interested in Tech News and more?

Subscribe