(Part 2) Best products from r/privacy
We found 23 comments on r/privacy discussing the most recommended products. We ran sentiment analysis on each of these comments to determine how redditors feel about different products. We found 128 products and ranked them based on the amount of positive reactions they received. Here are the products ranked 21-40. You can also go back to the previous section.
21. PNY 64GB Turbo Attaché 3 USB 3.0 Flash Drive - (P-FD64GTBOP-GE)
- Transfer speeds approximately 10 times faster than standard PNY USB 2.0 Flash drives
- Store and transfer large files faster than ever with USB 3.0 technology
- Allows for quick and Easy transfer of all content
- The 64GB Turbo USB 3. 0 Flash Drive can hold approximately 11, 837 songs
- Sliding collar, capless design with integrated loop makes it easy to attach to key chains, backpacks and etc.
- Backwards compatible with USB 2.0 Ports, so you can utilize any USB 2.0 or USB 3.0 port; Compatible with most PC and Mac laptop and desktop computers
- Free technical support
- Compatible Devices: Tablet
- Transfer speeds approximately 10 times faster than standard PNY USB 2.0 Flash Drives
- Store and transfer large files faster than ever with USB 3.0 technology
- Allows for quick and easy transfer of all content
- The 64GB Turbo USB 3.0 Flash Drive can hold approximately 11,837 songs
- Sliding collar, capless design with integrated loop makes it easy to attach to key chains, backpacks and etc
- Backwards compatible with USB 2.0 ports, so you can utilize any USB 2.0 or USB 3.0 port; compatible with most PC and Mac laptop and desktop computers
- Free technical support
Features:
23. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
- Pocket Books
Features:
24. Future Crimes: Inside The Digital Underground and the Battle For Our Connected World
- CORGI BOOKS
Features:
28. The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy
- Heavy Duty Chain and Padlock: Our H&S security chain makes it difficult for the theft to cut this with bolt cutters and other tools. The strength of this chain pair with a robust padlock with keys to enhance and add maximum protection to your bike.
- Innovative Design with 5 Keys: Our bike chain and padlock set is known for their high-impact strength and has 5 keys to ensure extra spares. The chain is covered by a thick black sleeve which protects the links from possible scratches
- Sturdy & Durable Construction: The mountain bike lock is hard to break through as the chain links are made of triple heat-treated boron manganese for the ultimate strength. The narrow inner width of individual links defends against leverage attacks.
- Wide Application: This cycle lock has a wide application that makes it ideal for motorcycles, gates, bicycles, fences, grills, boxes, ladders, etc. Use it freely to protect your valuable objects and enjoy your beautiful day without worry
- A Perfect Gift Idea: The heavy duty bike lock and chain can be used for both outdoor bikes and bicycles. It makes a thoughtful gift idea for a birthday, Father's Day, or any occasion for someone who loves riding bicycles and keeping them secure.
Features:
29. Kingston Digital 4GB Data Traveler AES Encrypted Vault Privacy 256Bit 3.0 USB Flash Drive (DTVP30/4GB)
- 256-bit AES hardware-based encryption to safeguard data
- Customizable to meet specific internal corporate IT requirements
- Optional Anti-Virus protection from ESET
- SuperSpeed (USB 3.0) technology
- TAA compliant
Features:
30. Edimax EW-7811Un 150Mbps 11n Wi-Fi USB Adapter, Nano Size Lets You Plug it and Forget it, Ideal for Raspberry Pi / Pi2, Supports Windows, Mac OS, Linux (Black/Gold)
- Supports 150 Mbps 802.11n Wireless data rate - the latest wireless standard. Permits users to have the farthest range with the widest coverage. (Up to 6 times the speed and 3 times the coverage of 802.11b.).
- Power Saving designed to support smart transmit power control and auto-idle state adjustment
- Supports WMM (Wi-Fi Multimedia) Standard so that you can let different types of data have higher priority. It would allows better streaming of real-time data such as Video, Music, Skype etc
- Includes multi-language EZmax setup wizard
- Spec Standards IEEE 802.11n; backward compatible with 802.11b/g Wi-Fi Certified. Security 64/128 bit WEP Encryption and WPA-PSK, WPA2-PSK security; WPS compatible IEEE 802.1X
- Port 1 x 2.0 USB Type A. Wireless Data Rates Up to 150 Mbps. Modulation OFDM: BPSK, QPSK, 16-QAM, 64-QAM, DSSS. Frequency Band 2.4GHz - 2.4835GHz. Antenna internal chip antenna
- Channels (FCC) 2.4GHz : 1~11. Power Input USB Port (Self-Powered). Dimensions 0.28" x 0.59" x 0.73". Temperature 0 -40 degree C (32-104 degree F). Humidity 10 ~ 90% Non-Condensing. System XP/Vista/Win7, Mac, Linux
Features:
31. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- Anchor Books
Features:
32. Secrets and Lies: Digital Security in a Networked World
- John Wiley Sons
Features:
33. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
John Wiley Sons
34. Radiant Systems Silicone Flexible Foldable Waterproof Full Size Pc USB Keyboard USB 2.0 Blue (Rolls Up, Flexible, Usb, See Through Blue Color)
- USB Version
- Flexible
- Radiant Systems Versions
- Rolls Up
- See through CLear Version
Features:
35. Ska Direct 100% Anti-Tracking Anti-Spying GPS RFID Signal Blocker Pouch Case Bag Handset Function Bag for Cell Phone Privacy Protection and Car Key FOB (Pink)
- High quality and perfect design, Can be used as a wallet at the same time
- Anti-radiation,anti-degaussing,anti-signal
- Prevent people from being tracked with this bag,Protect your privacy
- If you don't want to answer the phone,you can put the phone in the bag,then the phone will tell "Calls can not be connected."
- Size: 3.5 x 7.2 x 0.4 inches
Features:
36. Webcam Cover Slide 0.022in Ultra Thin Metal Magnet Web Camera Cover for MacBook Pro Laptops Smartphone Mac PC Tablets for Echo Spot Show Protecting Your Privacy Security Black(3 Packs)
- 【Metal Base&Magnetic Slider&3M Adhesive】Our webcam cover slide is made of Nickel plated metal base and magnetic slider, sleek and sturdy. 3M adhesive ensures its staying put on different flat surfaces and glasses.
- 【Ultra Thin&Fit on Most Devices】ONLY 0.022in THIN, thinner than credit card, never prevents laptops from closing. Compatible with most Laptops,Macbook,Macbook Pro,Smartphone,Tablets,Echo Spot,Echo Show and All-in-one desktops, protecting your personal privacy from everywhere.
- 【Easy to Install and Use】You can easily tear off the back sticker,then attach it to your webcam,press it firmly in place and hold for about 12 seconds for a strong but non-permanent seal.Simply place your finger on the magnetic slider and slide to cover or uncover your webcam.
- 【Necessary for You】Cover your webcam when not in use,and prevent web hackers from Spying on your life. It is perfect and convenient to provide privacy security and peace of mind to individuals,families,groups,companies,organizations and governments.
- One set comes with 3 pieces, meet your everyday need. Due to its size, this webcam cover is used for in-built webcam (front camera) on most laptops, phones and tablets, but not for external webcam.
Features:
37. Thieves Emporium
- Compatible with HDTVs
- Supports 720p resolution in 4:3 or 16:9 (via built-in Aspect Ratio Switch)
- Clear picture quality and crisp stereo audio
Features:
38. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
- W W Norton Company
Features:
39. LectroFan Micro Wireless Sleep Sound Machine and Bluetooth Speaker with Fan Sounds, White Noise, and Ocean Sounds for Sleep and Sound Masking
- Ten unique sounds for sleep and relaxation, including five fan sounds, four white noise variations, and a soothing ocean sound
- Compact swivel design lets you project the sound where you want it for optimal effectiveness
- Wireless Bluetooth audio with a built-in microphone for listening to music or making conference calls with your smartphone
- Built-in rechargeable battery provides up to 16 hours of ambient sounds or six hours of streaming audio between charges
- With rich, lush sound in a small size, it's a great way to take white noise and wireless audio with you wherever you go
- NOTE: Shipping regulations require that Lithium Ion batteries be shipped mostly discharged.The battery needs to be charged before use.
Features:
I typically just edit my local copy of the container, then manually copy/paste it out to multiple thumb drives, because I only really make updates once a year (tax time). I just plug them all into a hub, copy, then paste, paste, paste.
If I were doing it more regularly, I would use a file sync utility. Microsoft's SyncToy is free and powerful, but I'm not sure I trust MS anymore. I would look for an open source sync/backup tool if I wanted to automate it now.
As for brands, I stick with any major brand (Transcend, SanDisk, Samsung, Kingston, PNY, I'm sure there are other good ones) in the format that makes the most sense. For safe storage, something like this would be great (bought one 3 years ago, still going strong):
https://smile.amazon.com/PNY-Turbo-64GB-Flash-Drive/dp/B00FDUHDAC
If you want to keep it in your bag, car, etc., you might want something ruggedized:
https://smile.amazon.com/Corsair-Flash-Survivor-Stealth-Drive/dp/B00YHL1LN8
To keep stuck in a laptop (or in my case, windows tablet) USB port, I personally use this one:
https://smile.amazon.com/gp/product/B01BGTG2A0/
I would recomend you to read Future Crimes by Marc Goodman https://www.amazon.co.uk/Future-Crimes-Digital-Underground-Connected/dp/0552170801?SubscriptionId=AKIAILSHYYTFIVPWUY6Q&tag=duckduckgo-ffab-uk-21&linkCode=xm2&camp=2025&creative=165953&creativeASIN=0552170801 mostly deals with the non existence of electronic security though and how it is and can be exploited
Information and Corporate security is a very big subject, so it kind of depends where you intend to take your story. But you can start by reading the Wikipedia article about InfoSec https://en.wikipedia.org/wiki/Information_security and then see how each area fits into your story and work out from there.
Some realisim in how difficult it can be to track down a hacker, read The Cuckoo's Egg by Clifford Stoll
https://www.amazon.co.uk/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787/ref=sr_1_1?s=books&ie=UTF8&qid=1500888747&sr=1-1&keywords=clifford+stoll very different from what you see in the media
IMHO the most interesting area in Information security is Social Engineering, it requires cunning and skill, and sometimes you can't stop admiring the talents and genius of some of these people. Read Social Engineering: The Art of Human Hacking https://www.amazon.co.uk/Social-Engineering-Art-Human-Hacking/dp/0470639539/ref=sr_1_1?s=books&ie=UTF8&qid=1500889212&sr=1-1&keywords=social+engineering+the+art+of+human+hacking
Each year Verizon release their data breach report http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ it is free to download (don't have to register, just click the download only button) I think that is possibly the best insight you can get into corporate security challenges in 2017
This isn't a short and sweet answer by any means, but if you're interested in understanding what it is about modern-day journalism that makes it so intrinsically difficult for honest journalism to flourish, I highly suggest you read Trust Me, I'm Lying by Ryan Holiday. I jut got done reading it a few weeks ago and found it fascinating.
It really depends on what you mean by "privacy." To wrap your head around all the different ways it's used, Dan Solove's article "A Taxonomy of Privacy" is a good read.
In general, Dan Solove's Nothing to Hide is definitely worth reading.
Robert O'Harrow's No Place to Hide is another good one.
Not books, but Peter Fleischer's blog, Bruce Schneier's blog, and Eugene Volokh's blog.
Also, privacy is kind of the flip-side of the free speech coin, so you'll want to read up on that. There are a bunch of authors that write about the privacy/free speech dichotomy, so here's a random list of various interesting things I've read recently: Eugene Volokh, Robert Larson, Anita Allen, Woodrow Hartzog, etc.
I don't know if there exist threat modeling for a single person but usually most of the materials online are at enterprise level or something to that level. Like those of certification materials Security+ and CEH v9 or other similar courses. It can somewhat give you an idea how you want to determine your threat model.
For courses, I like Nathan House's stuff from Udemy.
There are as well books that cover those topics but the pages can range around 200 to over 600 of pages. E.g. The Basics of Cyber Safety has 254 pages and Threat Modeling: Designing for Security has 624 pages.
You can check those also:
https://en.wikipedia.org/wiki/Threat_model
https://en.wikipedia.org/wiki/Threat_%28computer%29#Threat_model
Otherwise see conferences like DEF CON, Black Hat, CCC and similar topics. Here's my give away:
I hope that helps.
Thanks again for the help!
I'll probably just pick up the DataAshur then and hope the price is worth it.
Just one more thing: is something like this just like what I linked in the OP? So, not worth getting?
an alternative to consider may be an actual laptop, maybe a refurb you can find cheaply, from which you physically remove the wireless NIC. if you wanted to connect to a wireless network, you could simply plug in a usb wifi adapter. there are some adapters, like this one, that boast native support for linux boxes. the advantage here is that a cheap refurb would have the horsepower to handle everything you wanted to do, as well as providing 100% certainty that it isn't transmitting any data since the adapter's physical presence in a usb port is required.
just be sure to look for a device with easy access to the nic (ymmv).
Some search terms for how the internet works: Packet switched networking, TCP, IP, SSL.
I don't think I have ever read a book about basic internet workings, the internet is really the best place to read about that stuff (hence the search terms).
Instead I will list some books which look at how we define security and why secure systems fail:
Secrets and Lies is a good primer discussing trust / networks / cryptography and a few other things at a high enough level to be interesting to a lay reader: http://www.amazon.com/Secrets-Lies-Digital-Security-Networked/dp/0471453803/ref=sr_1_4?ie=UTF8&qid=1419753343&sr=8-4
Art of Intrusion is packed full of stories about how systems (computers or otherwise) fail and become insecure: http://www.amazon.com/Art-Intrusion-Exploits-Intruders-Deceivers/dp/0471782661/ref=sr_1_1?ie=UTF8&qid=1419753466&sr=8-1 the sister book Art of Deception (stories about Social Engineering) is also pretty good.
The Code Book, mostly history, but provides a great introduction to cryptographic concepts. http://www.amazon.com/The-Code-Book-Science-Cryptography/dp/0385495323/ref=pd_rhf_se_s_cp_7_RTJS?ie=UTF8&refRID=1RRWWY0RNX7G8HRYPFFS
>Hopefully some people will find it useful.
I know I would.
A lot of folks would also be interested in finding out what is the best open-source anti-keylogger.
Another interesting idea: use a Raspberry Pi and a clear fold up keyboard as a difficult-to-add-a-keylogger-to system.
Get some cheap camera cover sliders. They easily fit over both front and back smartphone cameras and they are good for laptop cameras as well.
https://www.amazon.com/gp/aw/d/B077ZT29P2/ref=psdcmw_172511_t2_B0769D5RLV
PS. I don’t endorse Amazon. If you can find them locally at a store, buy from there instead.
Thieves Emporium is an EXCELLENT "instructional" thriller illustrating the very real challenges and successes of using TAILS and Tor (the "badlands") to survive economically in an American police state.
In one plot element, the Feds use the double-blind anonymity of the dark web to partner with the Russian mafia to set up a false flag bombing operation of TSA roadblocks using spare tire fertilizer bombs. The resultant public outcry enables .gov to get all the laws and police state tactics that they want approved. Just like 9/11 did with the Patriot Act and the Gladio-like mass shooting attempts from 2012-2016.
Fiat monetary system is a core plot element.
Lots of tips on how to stay anonymous. NSA has compromised Windows and Mac but not Linux in the book and in real life. Very useful Appendixes.
It's absolutely possible. Diaspora was a decentralized social network almost a decade ago. And end to end encrypted photo messaging services exist too, all over the place: signal, ichat, WhatsApp... Hell, even bittorrent is encrypted now.
NAT doesn't make this hard since the advent of upnp several years ago.
We have the technology. The issue is the market and legal situations. Problems like
If you're interested in the subject I highly recommend Bruce Schneier's book, Data and Goliath. An eye opening book from one of the most important people in the industry.
I have that exact same pouch and it definitely does the job. I put my phone in, and within a minute or so, I'll unvelcro it, look and my signal is gone. I will also try calling it while it's in the pouch and it does not ring.
Here's a new spin on being extra private as well. Put one of these in a large tupperware storage container, with the lid open/closed your preference. Then place your phone inside the container. The phone will only be able to pick up white noise, and the container keeps from hearing any outside conversations. I've been doing this lately because it makes me feel more comfortable that my conversations aren't always on record via my phone. You can also keep your ringer on loud so you can see whether or not you get notifcations as well.
The first thing I'd do is a network audit.
Open up your router admin page and do an audit of your network where you account for each and every device on the network. Do a 1 to 1 comparison where you look at each and every device associated with your network and account for that device by knowing what it is.
Cable boxes, TVs, thermostats, computers, phones, tablets, washers and dryers, door locks, Apple watches, Sonos speakers, sex toys, cameras, doorbells, cars, drone/quadcopters, video game consoles, etc etc.
The list can easily grow to 20, 30, 40, or even more devices on your network.
If you find devices you don't recognize, I'd recommend resetting your router to factory specs and changing the log-in credentials. Then, as you reconnect devices to the network, make a list that you keep track of.
If and when new devices show up, you can search the first 3 octets of the MAC address for manufacturer information. Assuming it's not a custom device and running macchanger, you should be able to track it down.
If he's got something installed locally that isn't connected to a WiFi network, you could search for RF transmissions with a device like this: https://www.amazon.com/gp/offer-listing/B07B49T23N/ref=dp_olp_0?ie=UTF8&condition=all
Happy hunting and good luck.
Here's a faraday case for your phone. Works great!
Quite a few options on amazon, I got this one and plan on getting larger bags when I have the budget.
Depending on how much you want to spend, you can get a tablet case, briefcase, or dufflebag. Don't get the flimsy mylar-looking bags, the won't pass the phone call test.
There's also a book https://www.amazon.com/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998