Cloud Storage

Storing your important documents, pictures and other things on a cloud server so that you may need to access anywhere, anytime is a pretty nifty idea. However, you should be wary before choosing a cloud storage provider, as they technically have access to everything you store on the cloud. Most of the cloud storage providers … Read more

File Sharing & Syncing

Sharing files with anyone online, be it your friends and family should not come at a cost of privacy and security. I will be covering all the ways you can share files easily and securely with your friends and family or anonymously, without a middleman. Most of the online file sharing techniques like sending via … Read more

Office & Productivity Tools

Office & Productivity apps like Microsoft Office, Google Docs, Evernote, etc are a great way of keeping track of all your notes and journaling, but it more often than ever comes with the cost of your privacy. Most of these productivity apps collect & store pretty much everything you have stored in them, as most … Read more

Two-Factor Authentication

Two-factor authentication (2fa), two-step login, or more broadly multi-factor authentication is the method of confirming a user’s identity, and giving them access only after they’re successfully presenting two or more pieces of evidence or factors: Knowledge: something they know (password, pin, passphrase) Possession: something they have (SMS, push notifications, software or hardware tokens) Inherence: something … Read more

Password Managers

Your online accounts are prone to attacks by hackers and other adversaries, from database breaches, software exploits, social engineering, etc. Most people tend to use the same weak password for their accounts due to Password fatigue, which makes them vulnerable to Brute force and Dictionary attacks. Strong, unique passwords are the key to keeping your … Read more

Email Providers

A secure and encrypted email service provider that respects your privacy, supports end-to-end encryption, collects little amount of metadata, is a must-have for a secure communication online. Email privacy is quintessential to protect your privacy & security online. While many communication methods have somewhat replaced email, most people still have and use at least one email account. Most … Read more

Messaging Apps

A secure instant messaging app is a must for anyone looking to have a private conversation. I recommend using instant messaging apps that are open source, support end-to-end encryption, and have good privacy policy. Ultimately, saying that you don’t care about privacy because you have nothing to hide is no different from saying you don’t … Read more

Search Engines

Search Engines like Google have made finding things on the internet exponentially easier — you can find pretty much anything from web pages, images, videos, software, and much more with just a click. However, this convenience usually comes with a cost of privacy, as the search engine giants like Google, Bing, Yahoo, Yandex are basically … Read more

Browser Add-ons

Browser add-ons or extension are basically a small piece of software that can be used to customize your web browser, including user interface modifications, password management, ad blocking, cookie management, and so much more. There are lots of browser add-ons available for your browser, be it Google’s Chrome, Apple’s Safari, Microsoft’s Edge or Mozilla’s Firefox. Most people have a favorite … Read more

Web Browsers

You should use a secure browser that protects your privacy, and keep your personal data secure. Most browsers don’t come with all the bells and whistles to protect your privacy online. Modern web browsers are complex programs with JavaScript and Browser engines — Apple, Google, and Mozilla have created their engines to render web pages: Companies Browser … Read more