How To: Set Up a Tails Virtual Machine for Private Browsing

If you want the privacy advantages of using a secure Linux-based OS like Tails but don’t want to use Linux all the time, an easy (and free) solution is to run Tails inside a virtual machine. Here’s how. These instructions should work for pretty much any Linux-based OS. But we have written them for Tails, since that is one of …

How Does ICLOAK Plug-and-Play Privacy Work?

ICLOAK recently launched its plug-and-play online privacy solution, which is based on a custom Linux distribution that boots from a USB stick. We contacted the company to get a better sense of how exactly its privacy features work, including Tor integration, VPN availability and more. This is what ICLOAK founder Eric Delisle said in response to questions about the product’s …

New Tails OS 2.0 Release Updates Privacy Features

Tails OS 2.0, the latest version of the privacy-focused Linux-based operating system, is out this week. It features a new interface and many application updates, including version 5.5 of the Tor browser. Tails 2.0 is designed to provide comprehensive, out-of-the-box privacy features. It comes with built-in Tor encryption for all network connections (not just the browser), as well as extra …

How To: Choose a Privacy-Focused Linux OS

Using a Linux-based operating system can help you avoid many of the privacy pitfalls of Windows and Mac OS X. Here’s a guide to some of the most popular Linux distributions available, with notes on how they compare regarding ease of use and privacy. If you’ve never used Linux before, you may not understand that there is no single Linux …

1

Two Free Privacy-Focused Mobile Operating Systems

Making Android-based mobile devices more private and secure can be a challenge. Here’s a look at two custom-built versions of Android that aim to provide comprehensive out-of-the-box privacy and security, with little work on the part of the user. Privacy gaps on Android exist at several levels. There’s the operating system itself, which could have bugs that allow third parties …

How To: Configure Windows 10 Privacy Settings

Privacy concerns in Windows 10 have spawned a number of apps designed to improve privacy in Microsoft’s operating system. Here’s a list of several apps you can use to help stop Windows 10 from collecting private information about you and sending it to Microsoft. You can, of course, configure privacy settings on Windows 10 manually. But the following apps aim …

2

How To Make Windows 10 More Private

Microsoft has never won any awards for protecting users’ privacy. But Windows 10 — the OS that “is spying on almost everything you do,” to quote from one article in the IT press — makes staying private harder than ever. Fortunately, there are steps you can take to mitigate the problem and improve security in Windows 10. To detail everything …

1

How to Set Your MAC Address Randomly Using Linux

In theory, every networking device has a unique media access control, or MAC, address. In practice, using a simple tool called macchanger, it’s easy to “spoof” your computer’s MAC address on Linux by setting a random value for it each time you connect to a network, which helps protect your privacy. Here’s how and why. How MAC Addresses Work Because …

Tails OS 1.5 Offers Out-of-the-Box Privacy Protection

Wouldn’t it be nice if there were an OS designed from the ground-up for privacy and security?  If you’re willing to give a Linux-based platform a try, there is: The Amnesic Incognito Live System — better known as Tails OS. It aims to make private computing a plug-and-play affair. Most mainstream operating systems do little to help users stay private. …

6

A Guide To Being Private Online

The services below will increase your security and reduce your surveillance by governments and advertisers. Here are my tips for maintaining on-line privacy: Use A Search Engine That Doesn’t Track You Many popular search engines like Google and Bing save your search history. Typically, your searches are saved along with some information about your computer (e.g. your IP address, User …

1

NinjaStik: Boot To An Anonymous OS In 60 Seconds

The NinjaStik is a bootable USB 3.0 memory stick. It allows to you boot your computer into an anonymous operating system (via custom firmware and Linux-based OS). There are a host of privacy-related tools on the stick — including a Tor Browser, a Bitcoin Wallet and Thunderbird with Enigmail installed. According to the company the Ninjastik can be used  a …

1

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine

A virtual machine makes it possible for your child to explore your computer freely without fears of configuration problems or lost files. If things do stop working, you can delete the virtual machine, restore from a backup, and the child is back with a working machine in just a few minutes You create a Virtual Machine by running another operating …

The Blackphone: A Pro-Privacy Phone

The Blackphone is a pro-privacy phone being developed by Spanish startup Geeksphone, in partnership with Silent Circle using an Android build called PrivatOS. The phone features Silent Phone and Silent Text for secure, encrypted telephony and messaging — using Silent Circle’s secure network — so that only you and someone also using a Blackphone or using Silent Circle’s service on …

Whonix: An Operating System Where IP & DNS Leaks Are Impossible

Whonix is an operating system focused on anonymity and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. In Whonix, DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. Whonix consists of two virtual machines on a separate, isolated virtual network. One virtual machine (VM) is …

How To Make Your Linux and VPNs Installs Easier

If you want to get started with VPNs and Linux without a lot of hassle, here are some recommendations: Get A Pre-Configured VPN Router A pre-configured VPN router can provide all your computers and mobile devices with encrypted internet connections. You won’t have to install a VPN client on each device, and all your devices count as one connection with …

A Fully Open Source Laptop Is Under Construction

Two enthusiasts (Sean “xobs” Cross and bunnie) are building a completely open-source laptop. You can read an article about this project here. Here are the blueprints for the laptop.