Create and use disposable virtual debit cards to make purchases anonymously and protect your real debit card number.
Use any name and billing address desired for additional privacy. Pause or delete cards to exercise granular control of your finances
PIA helps secure all data in motion on the computer or the phone. As a program that runs in the background, seamless to the user, all internet traffic is encrypted, protected, and private. PIA is well known for its fast speed and reliability.
Protonmail is an easy to use secure email service with built-in end-to-end encryption and state of the art security features.Their goal is to build an internet that respects privacy and is secure against cyberattacks. Protonmail does not scrape and sell your data, and offers both free and paid email service.
LastPass Remembers all your passwords, so you don't have to. Prevent account take over by ensuring you are using a different username and password on every account. LastPass will help you do it.
A completely secure app, Sudo gives you up to nine avatars - Each with its own custom phone number and email address. Use your Sudo identity to protect yourself against hackers, trackers, online and threats, and identity theft. Now you can call, text, and email anyone, internationally-even if they don't have Sudo.
The Wire app allows users to exchange end-to-end encrypted instant messages, as well as make voice and video calls.
Create a new e-mail address whenever you need one. Maintain complete control over active addresses. Forwards all mail to your existing e-mail address. You can even reply anonymously to emails forwarded by 33Mail. Never receive unwanted e-mail again!
Masked email addresses that forward to your primary email account for privacy online. Block emails anytime to prevent spam. Exercise ultimate email control with Blur.
Mint Mobile is a prepaid phone service that is cheaper than average plans because they buy in bulk. As a prepaid service, any name can be used so long as payment is made. Mint is has fast 4G data and is on the GSM network.
(by Michael Bazzell) - This book serves as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view.
(by Michael Bazzell and Justin Carroll) - This comprehensive book (which includes all information from Michael Bazzell's "Hiding from the Internet: Eliminating Personal Information Online" book) explains how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden.
(by Michael Bazzell and Justin Carroll) - The first volume of this series made you digitally invisible. This book continues with your journey and explores physical privacy and security in the real world. After 100 pages of updates from the previous volume, this book explains how to be private and secure in your home and while you travel. You will create a more secure home perimeter, use living trust and LLC's to privately title your home, apply physical disinformation techniques around your property, execute a fail-proof firewall to protect your entire home network and devices, install better locks on your doors, enable advanced features of your alarm system, install proper home safe, modify your vehicles and usage, privately title your vehicle and registration, embrace surveillance under your terms, avoid threats to your safety, secure your belongings from physical and digital intrusion during travel, and become more aware of your surroundings while being prepared to take action.
COMSEC uncovers the methods used by businesses, data brokers, and governments to harvest our data using the surveillance device that we allow into our lives in order to stay constantly connected. The authors share detailed first-hand knowledge about the tools, trade-craft, and techniques used to mitigate and eliminate the threats posed by tracking our communications. These same tactics, taught to covert law enforcement officers, military operatives, and the clandestine community, are explained here for anyone to adopt for their own strategy.
(By Michael Bazzell) This podcast will explain how to become digitally invisible. You will
make all of your communications private, data encrypted, internet
connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden.
You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of ‘the system’.
You will use covert aliases and misinformation to eliminate current and future threats toward your privacy & security.
When taken to the extreme, you will be impossible to compromise.