Create and use disposable virtual debit cards to make purchases anonymously and protect your real debit card number.
Use any name and billing address desired for additional privacy. Pause or delete cards to exercise granular control of your finances
*Full disclosure, we are affiliates with privacy and the link is an affiliate link which gives you $10 for signing up.
ProtonVPN (Owned by ProtonMail) is a Swiss based company that helps secure all data in motion on any device. As a program that runs in the background, seamless to the user, all internet traffic is encrypted, protected, and private. ProtonVPN fast and built with security in mind.
ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features.Their goal is to build an internet that respects privacy and is secure against cyber attacks. ProtonMail does not scrape and sell your data, and offers both free and paid email service.
Information security professionals recommend the use of password managers to prevent account take over by ensuring you are using a different username and password on every account.
LastPass remembers all your passwords, so you don't have to. LastPass allows you to safely and securely store and access all of your passwords.
A completely secure app, Sudo gives you up to nine avatars - Each with its own custom phone number and email address. Use your Sudo identity to protect yourself against hackers, trackers, online and threats, and identity theft. Now you can call, text, and email anyone, internationally-even if they don't have Sudo.
The Wire app allows users to exchange end-to-end encrypted instant messages, as well as make voice and video calls.
Create a new e-mail address whenever you need one. Maintain complete control over active addresses. Forwards all mail to your existing e-mail address. You can even reply anonymously to emails forwarded by 33Mail. Never receive unwanted e-mail again!
Masked email addresses that forward to your primary email account for privacy online. Block emails anytime to prevent spam. Exercise ultimate email control with Blur.
Mint Mobile is a prepaid phone service that is cheaper than average plans because they buy in bulk. As a prepaid service, any name can be used so long as payment is made. Mint is has fast 4G data and is on the GSM network.
(by Michael Bazzell) - This book serves as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view.
(by Michael Bazzell and Justin Carroll) - This comprehensive book (which includes all information from Michael Bazzell's "Hiding from the Internet: Eliminating Personal Information Online" book) explains how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden.
(by Michael Bazzell and Justin Carroll) - The first volume of this series made you digitally invisible. This book continues with your journey and explores physical privacy and security in the real world. After 100 pages of updates from the previous volume, this book explains how to be private and secure in your home and while you travel. You will create a more secure home perimeter, use living trust and LLC's to privately title your home, apply physical disinformation techniques around your property, execute a fail-proof firewall to protect your entire home network and devices, install better locks on your doors, enable advanced features of your alarm system, install proper home safe, modify your vehicles and usage, privately title your vehicle and registration, embrace surveillance under your terms, avoid threats to your safety, secure your belongings from physical and digital intrusion during travel, and become more aware of your surroundings while being prepared to take action.
COMSEC: Off-The-Grid communications strategies for privacy enthusiasts, journalists, politicians, crooks, and the average Joe (by Justin Carroll and Drew M.) - COMSEC uncovers the methods used by businesses, data brokers, and governments to harvest our data using the surveillance device that we allow into our lives in order to stay constantly connected. The authors share detailed first-hand knowledge about the tools, trade-craft, and techniques used to mitigate and eliminate the threats posed by tracking our communications. These same tactics, taught to covert law enforcement officers, military operatives, and the clandestine community, are explained here for anyone to adopt for their own strategy.
Extreme Privacy: What It Takes to Disappear (2nd Edition by Michael Bazzell) - For the past five years, Michael Bazzell has been helping celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This 370-page textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described.
(By Michael Bazzell) This podcast will explain how to become digitally invisible. You will
make all of your communications private, data encrypted, internet
connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden.
You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of ‘the system’.
You will use covert aliases and misinformation to eliminate current and future threats toward your privacy & security.
When taken to the extreme, you will be impossible to compromise.
This blog by Justin Carroll covers a wide range of extremely useful privacy and security techniques and ideas both in the digital space and the physical world.