Governments have transformed the internet right into a surveillance platform, but they are not omnipotent. They\’re tied to material resources as much as everyone else. We might not all be able to steer clear of the NSA and GCHQ from spying on us, but we can at least create more obstacles to make surveilling us more expensive. The more infrastructure you manage, the safer the communication will be. Download installation software for these programs. You can read detailed installation and setup instructions here.
THIS GUIDE Is definitely an BRIEF INTRODUCTION TO ONLINE SECURITY Hoping THAT YOU\’LL INVESTIGATE FURTHER. DON\’T Rely on your LIFE TO IT.
1. TOR BROWSER BUNDLE
Includes all you must access the Tor Network.
Makes it much harder to trace Internet activity: Web surfing, online posts, instant messages and various communication forms. Cannot prevent monitoring of traffic entering/exiting the network. While Tor protects against traffic analysis, it can\’t prevent traffic confirmation (generally known as end-to-end correlation).
2. BLEACH BIT
Many features to help you easily clean your computer, free-up space and maintain privacy.
A live operating-system. Start on almost any computer from DVD/USB stick. Preserves your privacy and anonymity.
Comes with several built-in applications pre-configured with the reassurance of mind: web browser, instant messaging client, email client, office suite and a lot more.
Create virtual hard drives which encrypt any files you will save onto them. Many types of encryption.
Chat software that permits use of existing instant messaging accounts. Supports Facebook, Google Chat, AIM, MSN + more.
6. Over RECORD
A simple plugin for Pidgin. It encrypts all conversations held while using software.
Free email software. Add your existing mail account on it.
A security extension to Thunderbird. Write/receive emails signed and/or encrypted with all the OpenPGP standard.
Free implementation of the OpenPGP standard. Encrypt and sign your emails.
(Via The Occupied Times)