Privacy Tools

Privacy.com - Virtual Debit Cards

Privacy.com - Virtual Debit Cards

Privacy.com - Virtual Debit Cards

Privacy.com

Create and use disposable virtual debit cards to make purchases anonymously and protect your real debit card number.

Use any name and billing address desired for additional privacy. Pause or delete cards to exercise granular control of your finances


*Full disclosure, we are affiliates with privacy and the link is an affiliate link which gives you $10 for signing up.

ProtonVPN

Privacy.com - Virtual Debit Cards

Privacy.com - Virtual Debit Cards

Proton
ProtonVPN
VPN
Virtual Private Network

ProtonVPN (Owned by ProtonMail) is a Swiss based company that helps secure all data in motion on any device. As a program that runs in the background, seamless to the user, all internet traffic is encrypted, protected, and private. ProtonVPN fast and built with security in mind.

ProtonMail - Secure Email

Privacy.com - Virtual Debit Cards

LastPass - Password Manager

Protonmail
pm.me
Secure Email
Encrypted Email
Comsec

ProtonMail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features.Their goal is to build an internet that respects privacy and is secure against cyber attacks.  ProtonMail does not scrape and sell your data, and offers both free and paid email service.

LastPass - Password Manager

LastPass - Password Manager

LastPass - Password Manager

LastPass
Password Manager

Information security professionals recommend the use of password managers to prevent account take over by ensuring you are using a different username and password on every account.


LastPass remembers all your passwords, so you don't have to. LastPass allows you to safely and securely store and access all of your passwords.

MySudo - Phone Numbers

LastPass - Password Manager

Wire - Secure Messenger

MySudo
Alias phone numbers
Sudo
Voip

A completely secure app, Sudo gives you up to nine avatars - Each with its own custom phone number and email address. Use your Sudo identity to protect yourself against hackers, trackers, online and threats, and identity theft. Now you can call, text, and email anyone, internationally-even if they don't have Sudo.

Wire - Secure Messenger

LastPass - Password Manager

Wire - Secure Messenger

Wire Messenger
Secure Messenger
Encrypted Comms
Secure Comms
COMSEC

The Wire app allows users to exchange end-to-end encrypted instant messages, as well as make voice and video calls.

33Mail

Mint Mobile

33Mail

33 Mail

Create a new e-mail address whenever you need one. Maintain complete control over active addresses. Forwards all mail to your existing e-mail address. You can even reply anonymously to emails forwarded by 33Mail. Never receive unwanted e-mail again!

Blur

Mint Mobile

33Mail

Blur
Abine

Masked email addresses that forward to your primary email account for privacy online. Block emails anytime to prevent spam. Exercise ultimate email control with Blur.

Mint Mobile

Mint Mobile

Mint Mobile

Mint Mobile

Mint Mobile is a prepaid phone service that is cheaper than average plans because they buy in bulk. As a prepaid service, any name can be used so long as payment is made. Mint is has fast 4G data and is on the GSM network.

Books and Publications

image1

Hiding from the Internet: Eliminating Personal Online Information 

(by Michael Bazzell) -  This book serves as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a  hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view.


The Complete Privacy & Security Desk Reference: Volume I: Digital

(by Michael Bazzell and Justin Carroll) - This comprehensive book (which includes all information from Michael Bazzell's "Hiding from the Internet: Eliminating Personal Information Online" book) explains how to become digitally invisible. You will make all of your communications private, data  encrypted, internet connections anonymous, computers hardened, identity  guarded, purchases secret, accounts secured, devices locked, and home address hidden.


The Complete Privacy & Security Desk Reference: Volume II: Physical

(by Michael Bazzell and Justin Carroll) - The first volume of this series made you digitally invisible. This book continues with your journey and explores physical privacy and security in the real world. After 100 pages of updates from the previous volume, this book explains how to be private and secure in your home and while you travel. You will create a more secure home perimeter, use living trust and LLC's to privately title your home, apply physical disinformation techniques around your property, execute a fail-proof firewall to protect your entire home network and devices, install better locks on your doors, enable advanced features of your alarm system, install proper home safe, modify your vehicles and usage, privately title your vehicle and registration, embrace surveillance under your terms, avoid threats to your safety, secure your belongings from physical and digital intrusion during travel, and become more aware of your surroundings while being prepared to take action.


COMSEC: Off-The-Grid communications strategies for privacy enthusiasts, journalists, politicians, crooks, and the average Joe (by Justin Carroll and Drew M.) - COMSEC uncovers the methods used by businesses, data brokers, and governments to harvest our data using the surveillance device that we allow into our lives in order to stay constantly connected. The authors share detailed first-hand knowledge about the tools, trade-craft, and techniques used to mitigate and eliminate the threats posed by tracking our communications. These same tactics, taught to covert law enforcement officers, military operatives, and the clandestine community, are explained here for anyone to adopt for their own strategy.


Extreme Privacy: What It Takes to Disappear in America (by Michael Bazzell) - For the past five years, Michael Bazzell has been helping celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This 370-page textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this book is based on real experiences with his actual clients, and is unlike any content ever released in his other books. The stories are all true, with the exception of changed names, locations, and minor details in order to protect the privacy of those described.

Blogs and Podcast

image2

Inteltechniques Blog

Blog by privacy, security, and OSINT expert Michael Bazzell


https://www.inteltechniques.com/blog/

image3

Hiding From the Internet

This blog by M.A. Drew contains excellent information and techniques for keeping personal information off the internet.


https://www.hidingfromtheinternet.com

image4

The Complete Privacy, Security, and OSINT Podcast

(By Michael Bazzell) This podcast will explain how to become digitally invisible. You will
make all of your communications private, data encrypted, internet
connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden.
You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of ‘the system’.
You will use covert aliases and misinformation to eliminate current and future threats toward your privacy & security.
When taken to the extreme, you will be impossible to compromise.


https://www.inteltechniques.com/podcast.html

image5

Operational-Security

This blog by Justin Carroll covers a wide range of extremely useful privacy and security techniques and ideas both in the digital space and the physical world.


https://operational-security.com/