From ba48eb68ed1930c7aa831c8580ab6b32d741b006 Mon Sep 17 00:00:00 2001
From: Mitchell Cash
-
+
Language:
-
- 繁體中文
-
+
+ 繁體中文
+
Español
-
+
Deutsch
Darknet:
- Tor,
-
- I2P,
-
+ Tor,
+
+ I2P,
+
ZeroNet
-
A privacy enhancing firefox addon which aims to hinder browser fingerprinting. It does this by changing the browser/device profile on a timer. Source code: GitHub.
https://addons.mozilla.org/firefox/addon/random-agent-spoofer/
Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
+
Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
All communications are end-to-end encrypted. Signal is free and open source, enabling anyone to verify its security by auditing the code. The development team is supported by community donations and grants. There are no advertisements,
and it doesn't cost anything to use.
@@ -1571,7 +1597,7 @@
Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
+
Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
All communications are end-to-end encrypted. Signal is free and open source, enabling anyone to verify its security by auditing the code. The development team is supported by community donations and grants. There are no advertisements,
and it doesn't cost anything to use.
@@ -1906,10 +1932,10 @@
- - + + - + @@ -1921,12 +1947,12 @@Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an - adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
+ adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).OS: Windows, Mac, Linux, Android.
It's important for a website like privacytools.io to be up-to-date. Keep an eye on software updates of the applications listed here. Follow recent news about providers that are recommended. We try our best to keep up but we're not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing or a browser plugin is not the best choice anymore and anything else... Talk to us please.
- +- +
This is a community project and we're aiming to deliver the best information available for a better privacy. Thank you for participating. This project needs you.
-- 2.49.0 From e37394b6ca231d29c9d51fd85011cb7a9e78c67b Mon Sep 17 00:00:00 2001 From: Mitchell Cash