nemozone

a zone for no one and everyone :) Btw this blog is only for adults! Dieser Blog ist nur für Erwachsene!

#reallifestories

Want to end a streetfight between two teenage groups as swiftly as possible? (This advice might not apply to the US.)

If possible, contact other people before stepping in.

Purchase a döner, step inside the confrontation, and eat your döner sandwich as calmly as possible.

Watch the amazed crowds looks and questions unfold.

“is this a döner in your hand?”

Chuckle inside, put a poker face on, and calmly deescalate.

Pro-tip: Always have a döner or snack with you. ;)

2nd Pro-tip: If this happens in front of a bank or high-risk area, e.g., a train station, or a combination of both, you can be assured that security or cops will arrive within 10 to 20 seconds.

When cops or security ask you if you were involved, say #no and calmly leave. :)

No one will question a calm döner eater.

What this might look like:

Click Here to Watch the Video

Click Here to Watch the Video

Cooking is considered one of the most important skills of humans, and it has helped us to further advance our scientific knowledge[1][2][3]. Cooking has made its way into many laboratories and journals, and researchers have turned the kitchen into a place for serious scientific study[2]. Collaborations between scientists and chefs have helped bring scientific knowledge and technological innovations into fine restaurants and even homes[2]. Cooking interventions have been promoted as a way to improve health, and they have been shown to have positive outcomes related to cooking skills and nutrition knowledge[3]. Recent studies have demonstrated that the method of preparation and cooking can improve the nutritional quality of food[4]. Cooking can also have a positive impact on emotions, engagement, relationships, meaning, and accomplishment[5]. In the pursuit of personalized nutrition, it is essential to understand the effect of various cooking methods on nutritional quality and food safety[6]. Therefore, cooking has played a significant role in advancing our scientific knowledge and improving our health and well-being.

Click Here to Watch the Video

“What's the point of cooking at home anymore?”

Click Here to Watch the Video

“How One Chef Is Fighting To Preserve A Cooking Tool As Old As Civilization Itself | Still Standing”

Still Standing

Citations: [1] https://penntoday.upenn.edu/news/exploring-relationship-between-cooking-and-scientific-discovery [2] https://www.nature.com/articles/486S10a [3] https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4063875/ [4] https://www.sciencedirect.com/science/article/pii/S1878450X15000207 [5] https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8071848/ [6] https://www.frontiersin.org/research-topics/49967/impact-of-cooking-techniques-and-ingredients-on-nutritional-quality-and-safety-acting-precisely-in-clinical-and-community-settings

Store Now, Decrypt Later (SNDL) is a cryptographic technique that involves storing encrypted data for an extended period before decrypting it[5]. It is also known as Harvest Now, Decrypt Later (HNDL) or retrospective decryption[1][4]. The technique relies on the acquisition and long-term storage of currently unreadable encrypted data awaiting possible breakthroughs in decryption technology that would render it readable in the future[4]. The most common concern is the prospect of developments in quantum cryptography which would allow current strong encryption algorithms to be broken at some time in the future, making it possible to decrypt any stored material that had been encrypted using those algorithms[4]. Cybersecurity experts have warned that hackers are stealing data now to decrypt it in the future, as quantum computing could render modern encryption methods obsolete[2][3]. To prepare for the arrival of quantum computers, security measures are being taken, and the US National Institute of Standards and Technology (NIST) has selected a group of encryption algorithms that could become the new cryptographic standard in a post-quantum world[2]. The urgency to update modern encryption methods is high, and academia and industry need to ensure that quantum-resistant encryption is a reality before quantum computers change the digital world as we know it[2][6].

Citations: [1] https://thequantuminsider.com/2023/02/07/guest-post-harvest-now-decrypt-later-the-truth-behind-this-common-quantum-theory/ [2] https://www.siliconrepublic.com/enterprise/quantum-apocalypse-store-now-decrypt-later-encryption [3] https://venafi.com/blog/store-now-decrypt-later-prepare-now-for-quantum-computing/ [4] https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later [5] https://www.linkedin.com/pulse/risks-store-now-decrypt-later-safeguarding-data-uncertain-haroon [6] https://www.entrust.com/solutions/post-quantum-cryptography

Signal

Signal is a secure, free, and open source messaging application that uses end-to-end encryption to securely send and receive all kinds of communications with other Signal users

KeepassDX

KeePassDX is an open-source password manager for Android . It allows users to edit encrypted keys and digital identities in a single KeePass file and fill out forms securely. It supports Argon2, Argon2id, as well as AES-KDF . Some users have reported issues with opening KeePassDX databases when the app is opened via “Share with KeePassDX” . However, others have praised KeePassDX for hitting the right balance between portability and ease of use . KeePassDX is a KeePass implementation for Android

SecScanQRCode

SecScanQR is a QR code scanner/generator that cares about user privacy[1][2]. It allows users to scan QR codes and share them with friends, or copy them to do a web search with the information from the QR code. The app also allows users to generate QR codes, barcodes, and many more formats[2].

SecScanQR is part of the Privacy Friendly Apps group developed by the research group SECUSO at Technische Universität Darmstadt[3][4]. The app requires minimal permissions, namely camera access and write external storage[2][3][4].

QR codes can contain malicious links, so it is important to carefully check the link before accessing the corresponding webpage[3][4]. To help users avoid not checking the link and in particular the highlighted domain carefully, the app provides information about possible fraud and its users need to confirm that they checked the link and it is trustworthy[4].

To scan a QR code using SecScanQR, users need to allow camera access and center the QR code on the screen[1][2][3][4]. The app supports the following formats: text, product codes, phone number, SMS, email address, email, contact information (e.g. vCards), URL, and WiFi information[3].

There are other ways to scan QR codes, such as using Google Lens or online QR code scanner web applications[5][6].

Citations: [1] https://f-droid.org/en/packages/de.t_dankworth.secscanqr/ [2] https://github.com/Fr4gorSoftware/SecScanQR [3] https://secuso.aifb.kit.edu/english/QR_Scanner.php [4] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.secuso.privacyFriendlyCodeScanner [5] https://www.wired.com/story/how-to-scan-a-qr-code/ [6] https://nanonets.com/blog/scan-qr-codes-from-photos-or-documents/

Greentooth

Greentooth is an Android app that can help users save battery and mitigate the security risks of Bluetooth by automatically turning Bluetooth off when it is no longer needed[4]. The app is available on both F-Droid and Google Play[1][2]. The app has a quick settings tile for turning on/off Greentooth[1]. Greentooth Technologies Private Limited (GTPL) is the developer of the app[2][3]. In addition to Greentooth, GTPL has also developed Extracarbon, an on-demand Kabadiwala app that allows users to sell their waste and old items for cash or shopping credits[3].

Citations: [1] https://f-droid.org/en/packages/com.smilla.greentooth/ [2] https://play.google.com/store/apps/details?hl=en_US&id=com.greentooth [3] https://play.google.com/store/apps/dev?gl=US&hl=en_US&id=6827947733752468361 [4] https://apkcombo.com/greentooth/com.smilla.greentooth/ [5] https://apkvision.org/app/communication/greentooth-79891/ [6] https://apkshub.com/app/com.smilla.greentooth

Osmand

OsmAnd is a map and navigation app available for Android and iOS[1][2][3][5]. It uses the OpenStreetMap (OSM) map database for its primary displays, but is an independent app not endorsed by the OpenStreetMap Foundation[1]. The app is available in both free and paid versions, with the latter unlocking the download limit for offline maps and providing access to Wikipedia points of interest (POIs) and their descriptions from within the app[1]. Some of the features of OsmAnd include:

  • Customization: OsmAnd allows customization of most things through the user interface, user-editable xml files, or creating plugins. Navigation can be changed to avoid certain roads or types of roads, avoiding size and weight restricted roads, and announcing traffic warnings and crosswalks. The rendering style of maps can be changed or custom maps can be created using your own data[1].

  • Offline maps: OsmAnd allows users to carry highly detailed, fully offline maps of any region worldwide on their device[2][3][5]. This is useful for areas with limited or no internet connectivity.

  • Navigation: OsmAnd provides turn-by-turn voice guidance, optional lane guidance, street name display, and estimated time of arrival[4]. It also supports intermediate points on your itinerary[4].

  • Search: Users can search for places by address, name, coordinates, or category[3][5]. The app also allows users to choose which places to be displayed on the map, such as attractions, food, health, and more[3][5].

  • Privacy: OsmAnd is an open-source app and does not collect user data. Users can decide what data the app will have access to[3][5].

OsmAnd is actively being developed and everyone can contribute to the application by reporting bugs, improving translations, or coding new features[4].

Citations: [1] https://en.wikipedia.org/wiki/OsmAnd [2] https://osmand.net [3] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=net.osmand [4] https://f-droid.org/en/packages/net.osmand.plus/ [5] https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257

UntrackMe

UntrackMe is an Android app that helps protect user privacy by removing tracking parameters from URLs[1][2][4]. The app is available in both a lite and full version, with the full version containing all features of the lite version and handling all links to remove tracking parameters[1]. UntrackMe also uses its own app picker that displays URLs before visiting them[1].

UntrackMe is specifically designed to work with Twitter and YouTube links[1][3][5][6]. Once set by default to open Twitter and YouTube links, UntrackMe transforms them into Nitter and Invidious links and delegates the action to another app[3][5][6].

To configure UntrackMe, users can click on the “CONFIGURE” button in the app, which will open Android's settings page for UntrackMe Lite[2]. From there, users can go to “Open by” and select UntrackMe as the default app for Twitter, YouTube, or Google Maps links[2].

UntrackMe is available for download on F-Droid and APKMirror[1][3]. Additionally, there is a Google Chrome extension available for UntrackMe[4].

Citations: [1] https://f-droid.org/en/packages/app.fedilab.nitterizeme/ [2] https://fedilab.app/wiki/untrackme [3] https://www.apkmirror.com/apk/tom79/untrackme-fdroid-version/ [4] https://chrome.google.com/webstore/detail/untrackme/obgcmibolhhaohbfkkjkcbfcdjdjimoa [5] https://alternativeto.net/software/untrackme/about/ [6] https://framagit.org/tom79/nitterizeme

Private Lock

https://f-droid.org/en/packages/com.wesaphzt.privatelock/

Newpipe

NewPipe is a free and open-source Android app that provides an intuitive, feature-rich, and privacy-friendly alternative to the YouTube app[1]. It allows users to watch videos on YouTube and other platforms such as SoundCloud, MediaCCC, PeerTube, and Bandcamp[2]. NewPipe has been created with the purpose of getting the original YouTube experience on Android devices without any annoying ads, tracking, or other privacy-invading features[1].

To install NewPipe, users can download it from the F-Droid app store, which is a trusted catalog of free and open-source applications for Android[1][4]. If users install NewPipe via the default F-Droid repository, updates for NewPipe might take their time to arrive. If users want to use their own repository, they can check out the next item in the slideshow[1].

There is also a subreddit dedicated to discussing features and more about NewPipe[2]. Additionally, there is a YouTube video that provides a tutorial on how to install NewPipe[3].

Citations: [1] https://newpipe.net [2] https://www.reddit.com/r/NewPipe/ [3] https://youtube.com/watch?v=bem4adjGKjE&t=0 [4] https://f-droid.org/en/packages/org.schabi.newpipe/

Blockada

Blokada is an ad blocker and privacy app for Android and iOS that is being supported and actively developed by the open-source community[1]. It blocks ads, trackers, and malware, and can be used for all apps and browsers without requiring root or jailbreak[1][2]. Blokada is free, secure, and open source, and its source code is available for Android and iOS[1]. Blokada Cloud is a new cloud-based ad-blocking solution that is faster and more reliable than the old method, and it can be used on multiple devices and supports any platform compatible with DNS over TLS/HTTPS[1]. Blokada Plus is a VPN that encrypts all traffic with a global VPN network[1][5].

Blokada Classic is an older version of Blokada that is still available for download and makes it easy to block ads and malware, and protect your privacy by blocking web tracking[2]. It also allows users to choose which apps or websites to block ads on, and even has a VPN that users can use to connect to the internet without regional restrictions[2]. Blokada 5 is another version of Blokada that is available for download and blocks ads, trackers, and malware, and can improve battery life[3].

The official subreddit of Blokada is available on Reddit, where users can discuss the app and ask questions[4]. Blokada is also available for download on the App Store for iOS devices[5].

Citations: [1] https://blokada.org [2] https://blokada-classic.en.uptodown.com/android [3] https://www.apkmirror.com/apk/blocka-ab/blokada-5-ad-blocker-privacy-app-no-ads-no-tracking-better-battery/ [4] https://www.reddit.com/r/blokada/ [5] https://apps.apple.com/us/app/blokada/id1508341781

OpenKeychain

OpenKeychain is a free and open-source mobile app for the Android operating system that provides strong, user-based encryption which is compatible with the OpenPGP standard[1]. It allows users to encrypt, decrypt, sign, and verify signatures for messages[1][2]. OpenKeychain stores and manages users' keys, as well as those of the people they communicate with, on their Android devices[2]. The app is based on the well-established OpenPGP standard, making encryption compatible across devices and systems[2]. OpenKeychain primarily integrates with K-9 Mail to provide end-to-end encryption capabilities[2]. The auditing company Cure53 performed an intensive security audit of OpenKeychain and concluded that none of the spotted issues were considered to be of critical severity in terms of security implications[2]. The app has been adapted to work with smart cards and NFC rings, resulting in a usability study published on Ubicomp 2017[1]. The OpenKeychain developers participated in three Google Summer of Code programs with a total of six successful students[1]. The app is available on GitHub[3] and its website provides installation instructions and a list of compatible software for Windows, Mac OS, and other operating systems[4]. There is also a tutorial on YouTube that explains how to use OpenKeychain[5].

Citations: [1] https://en.wikipedia.org/wiki/OpenKeychain [2] https://www.openkeychain.org [3] https://github.com/open-keychain/open-keychain [4] https://www.openpgp.org/software/openkeychain/ [5] https://youtube.com/watch?v=NFnxZmS2Z2Y&t=0 [6] https://www.reddit.com/r/GPGpractice/comments/11og6fp/openkeychain_android_help/

Mull Browser

This is a privacy-oriented and deblobbed web browser based on Mozilla Firefox technology. It enables many features upstreamed by the Tor Uplift project using preferences from the arkenfox-user.js project. It is recommended to install uBlock Origin. Mull does not connect to various Mozilla and Google services that track users. To find it, enable the “Divest OS” repo in Aurora Droid, or add the following repo to F-Droid manually. It is available on F-Droid.

Fenec

Opensource Firefox Android

Haven

Haven is a free and open-source security application for Android designed to monitor activity occurring in the vicinity of a device using its built-in sensors, and to alert the device owner of such activity[3]. It is an Android application that leverages on-device sensors to provide monitoring and protection of physical areas[1]. Haven turns any Android phone into a home security system that can detect motion, send app alerts to users, record set periods of time, hear/record sound, and detect physical phone movement[3]. The app is designed to be installed on a cheap Android burner, and it uses the phone's cameras, microphones, and even accelerometers to monitor for any motion, sound, or disturbance of the phone[6]. The Haven app can be downloaded from Google Play or from the Haven Nightly “Bleeding Edge” repository[1]. The app requires a SIM card to send SMS alerts, and there are some limitations to its functionality[3].

Citations: [1] https://guardianproject.github.io/haven/ [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.havenapp.main [3] https://en.wikipedia.org/wiki/Haven_(software) [4] https://apps.apple.com/us/app/haven-preventative-security/id1326207881 [5] https://apps.apple.com/us/app/haven-dispensaries/id1590406477 [6] https://www.wired.com/story/snowden-haven-app-turns-phone-into-home-security-system/

F-Droidstore

F-Droid is an installable catalog of FOSS (Free and Open Source Software) applications for the Android platform[1][2]. It is an alternative to the Google Play Store and is characterized by the fact that it only contains free and open-source apps[2][4]. The main repository, hosted by the project, contains only free and open-source apps, and applications can be browsed, downloaded, and installed from the F-Droid website or client app without the need to register for an account[2]. The F-Droid client makes it easy to browse, install, and keep track of updates on your device[1]. F-Droid is powered by donations[1].

F-Droid is not available on the Google Play Store, so to install the F-Droid client, the user has to allow installation from “Unknown sources” in Android settings and retrieve the F-Droid Android application package (.apk file) from the official site[2]. The selection of apps is much smaller in F-Droid than the Play Store, around 3,000 compared to around 3 million[2]. However, F-Droid offers a variety of tools, and all the available applications have free licenses like GPL, MIT, or Apache[4].

F-Droid Nearby is a simple app for exchanging free software apps locally, device-to-device, even when the internet is not available or too expensive[5]. It is compatible with the built-in Nearby feature of the F-Droid client app[5].

Citations: [1] https://f-droid.org/en/ [2] https://en.wikipedia.org/wiki/F-Droid [3] https://f-droid.en.uptodown.com/android [4] https://f-droid.en.softonic.com/android [5] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.fdroid.nearby

PilferShush

PilferShush Jammer is an experimental Android app that blocks other apps from using the microphone without the user's knowledge[2][4]. It uses a passive jamming technique that engages the microphone, thereby blocking other apps from using it, but it does not listen to or record any of the audio[1]. To block unwanted use of the microphone by hidden app processes, PilferShush Jammer requests use of the hardware microphone from the Android system and holds it, locking up the microphone from any other apps attempting to gain access to it[2][4]. This technique has been tested only on user apps, not system apps[2]. When the jamming technique is running and the microphone is locked up, PilferShush Jammer posts a notification to keep the user informed that it is running[2][4]. Tests have shown that it uses 0% CPU, 0% network, and 43.6mb RAM when running for over an hour[2][4]. PilferShush Jammer is an experimental app made as part of research into audio counter-surveillance methods within the Android and IoT world[4][6].

Citations: [1] https://f-droid.org/en/packages/cityfreqs.com.pilfershushjammer/ [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=cityfreqs.com.pilfershushjammer [3] https://www.reddit.com/r/privacytoolsIO/comments/js0vgg/pilfershush_jammer_review/ [4] https://download.cnet.com/PilferShush-Jammer/3000-20432_4-78284741.html [5] https://pilfershush-jammer.soft112.com [6] https://github.com/kaputnikGo/PilferShushJammer

FOSS Weatherwarn App

FOSS Weather is a FOSS weather app that provides weather information from several webservices. It can show weather information from wetterdienst.de, meteoblue.com, and the DWD. It also has features such as capturing websites for offline use, sharing screenshots of the whole webview, and searching and saving other locations as bookmarks. However, this app is no longer maintained.

Ripple

Ripple is a “panic button” app created by Guardian Project[1][2][3][5]. It allows users to send a trigger message to any app that is set up as a “panic responder”[1]. These responder apps can then perform actions such as locking or disguising themselves[1]. Ripple is available for free on F-Droid, a free and open-source Android app repository[3]. It is also available on GitHub, where users can learn more about the app and contribute to its development[2]. Additionally, Guardian Project has created PanicKit, an Android framework for building panic button functionality into other apps[6].

Citations: [1] https://guardianproject.info/apps/info.guardianproject.ripple/ [2] https://github.com/guardianproject/ripple [3] https://f-droid.org/en/packages/info.guardianproject.ripple/ [4] https://hosted.weblate.org/projects/guardianproject/ripple/ [5] https://ovio.org/project/guardianproject/ripple [6] https://youtube.com/watch?v=mS1gstS6YS8

WifiAnalyzer

WiFiAnalyzer is an Android application available on F-Droid that allows users to optimize their WiFi network by checking WiFi network status, signal strength, and identifying crowded channels[1]. The app features a list view and diagram views for the 2.4 GHz, 5 GHz, and 6 GHz band[2]. WiFiAnalyzer can identify nearby access points, graph channels signal strength, and analyze WiFi networks to rate channels[3]. The app is not a WiFi password cracking or phishing tool[3].

Some of the features of WiFiAnalyzer include:

  • Tap the title bar to switch between 2.4, 5, and 6 GHz WiFi band.
  • SSID with ***or hidden means it is hidden.
  • Access Point security: WPA3(SAE)/WPA2/WPA, WEP/WPS, Disabled.
  • Wi-Fi Standard (Requires Android OS 11+): Wi-Fi 802.11a/b/g, Wi-Fi 802.11n, Wi-Fi 802.11ac, Wi-Fi 802.11ax.
  • Access Point view complete or compact.
  • Estimated Distance to the Access Points.
  • Export access points details.
  • Dark, Light, and System theme available.
  • Pause/Resume scanning.
  • Available filters: WiFi band, Signal strength, Security, and SSID.
  • Vendor/OUI Database Lookup[4].

Users can download WiFiAnalyzer from F-Droid or APKMirror. It is important to note that downloading the app from APKMirror means that users will not receive update notifications and it is a less secure way to download[1][5][6].

Citations: [1] https://f-droid.org/en/packages/com.vrem.wifianalyzer/ [2] https://f-droid.org/en/packages/org.bitbatzen.wlanscanner/ [3] https://vremsoftwaredevelopment.github.io/WiFiAnalyzer/ [4] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.vrem.wifianalyzer [5] https://www.apkmirror.com/apk/vrem-software-development/wifianalyzer-open-source-fdroid-version/wifianalyzer-open-source-fdroid-version-3-0-9-release/ [6] https://www.apkmirror.com/apk/vrem-software-development/wifianalyzer-open-source-fdroid-version/wifianalyzer-open-source-fdroid-version-3-0-2-release/

Pixelknot

PixelKnot is an Android application developed by Guardian Project that allows users to hide short text-based messages in photographs and share them across trusted channels[2]. The app uses steganography, which is the practice of concealing a message within another non-secret message, to hide the text inside a picture[2][3]. Some key features of PixelKnot include:

  • Disguise Your Messages: The text is hidden inside a picture, making it difficult for anyone to know that there is a hidden message[2].
  • Password Protection: Users can put a password on the secret message to make sure that only the intended recipient can read it[2].
  • Free and Open-Source: PixelKnot is free software and its source code is available on GitHub[2][3].

PixelKnot can be downloaded for free from Google Play, F-Droid, Uptodown, and Amazon Appstore for Android[1][4][5][6]. The app has been available since July 2013 and has received positive reviews from users[2][6].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=info.guardianproject.pixelknot [2] https://guardianproject.info/archive/pixelknot/ [3] https://github.com/guardianproject/PixelKnot [4] https://pixelknot.en.uptodown.com/android [5] https://www.amazon.com/The-Guardian-Project-PixelKnot-Messages/dp/B00E7TGIO2 [6] https://www.appbrain.com/app/pixelknot-hidden-messages/info.guardianproject.pixelknot

ProofMode

ProofMode is an open-source project developed by Guardian Project and WITNESS[2]. It is a lightweight and minimal “reboot” of the full encrypted, verified secure camera app, CameraV[1][3][4]. The goal of ProofMode is to provide a no-setup-required, automatic new user experience that works without requiring training, and to run all of the time in the background without noticeable battery, storage, or network impact[1][3][4]. ProofMode uses strong cryptography for strong identity and verification features, but not encryption[1][3]. It produces “proof” data formats that can be easily parsed and imported by existing tools[1][3]. ProofMode automatically adds digital proof data to all photos and videos taken, which can then be easily shared through a “Share Proof” share action, to anyone you choose[1][3]. However, according to a blog post from 2017, ProofMode doesn't prove anything, as all data sources, from the camera picture to the location data, can easily be faked[5].

Citations: [1] https://guardianproject.info/apps/org.witness.proofmode/ [2] https://proofmode.org/about [3] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.witness.proofmode [4] https://github.com/guardianproject/proofmode-android [5] http://www.lieberbiber.de/2017/03/07/the-guardian-projects-proof-mode-app-for-activists-doesnt-work/ [6] https://blog.witness.org/2017/07/media-activists-witness-guardian-project-back/

Save

https://guardianproject.info/apps/net.opendasharchive.openarchive.release/

https://directory.civictech.guide/listing/save

Zom

The Guardian Project is a global collective of software developers, designers, advocates, activists, and trainers who develop open-source mobile security software and operating system enhancements[1]. They also create customized mobile devices to help individuals communicate more freely and protect themselves from intrusion and monitoring. The project was founded by Nathan Freitas in 2009 in Brooklyn, NY, and has developed more than a dozen mobile applications for Android and iOS with over two million downloads and hundreds of thousands of active users[1].

PanicKit is a system-wide panic response software developed by the Guardian Project. It includes Zom with multiple destructive responses and a default lock response[2].

The Guardian Project has a presence on GitHub, where they host various repositories related to their software development projects[3].

“Guardian Project” is also the name of a card in the Magic: The Gathering trading card game[4][5].

Lastly, “Guardian Project” is the name of a gym on Instagram with over 11,000 followers[6].

Citations: [1] https://en.wikipedia.org/wiki/Guardian_Project_(software) [2] https://guardianproject.info/code/panickit/ [3] https://github.com/guardianproject [4] https://www.cardkingdom.com/mtg/ravnica-allegiance/guardian-project [5] https://mysterymtg.com/products/guardian-project [6] https://www.instagram.com/guardiangym/?hl=en

Hypathia

Hypatia is a free and open-source malware scanner for Android available on F-Droid[1][2][3][4]. It is powered by ClamAV style signature databases and has the following features:

  • Near zero battery impact
  • Regular scan: allowing selection of /system, internal storage, external storage, and installed apps
  • Realtime scanner: can detect malware in realtime on write/rename in internal storage
  • Completely offline: Internet is only used to download signature databases, files will never ever leave your device
  • Persistence: will automatically restart on boot/update

To install Hypatia, it is recommended to install the F-Droid client and use that[1]. The app requires Android 4.1 or newer and allows the app to make use of foreground services[1].

Citations: [1] https://f-droid.org/en/packages/us.spotco.malwarescanner/ [2] https://f-droid.org/packages/us.spotco.malwarescanner/ [3] https://f-droid.org/de/packages/us.spotco.malwarescanner/ [4] https://f-droid.org/fr/packages/us.spotco.malwarescanner/ [5] https://f-droid.org/packages/ [6] https://forum.xda-developers.com/t/app-4-1-hypatia-a-real-time-malware-scanner.4249431/ [7] https://www.reddit.com/r/androidapps/comments/1096orp/malware/

Orbot

Orbot is a free proxy app that provides anonymity on the internet for users of the Android and iOS operating systems[1][2][3][4]. It uses Tor to encrypt internet traffic and then hides it by bouncing through a series of computers around the world, instead of connecting directly like traditional VPNs and proxies[2][4]. Orbot allows traffic from apps such as web browsers, email clients, map programs, and others to be routed via the Tor network[1]. It is used to keep the communications of users anonymous and hidden from governments and third parties that might be monitoring their internet traffic[1].

Some key features of Orbot include:

  • Privacy: Orbot prevents someone watching your connection from knowing what apps you are using or websites you visit. All anyone monitoring your network traffic can see is that you’re using Tor[4].

  • Access to .onion sites: Orbot allows access to .onion sites that are only accessible over Tor[3].

  • Slow browsing: Web browsing is much slower than through a normal VPN because traffic is encrypted and relayed through the Tor network[3].

Orbot is free and open-source software[3][6]. It is available for download on Google Play and the App Store[2][3][6].

Citations: [1] https://en.wikipedia.org/wiki/Orbot [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.torproject.android [3] https://apps.apple.com/us/app/orbot/id1609461599 [4] https://guardianproject.info/apps/org.torproject.android/ [5] https://orbot.app [6] https://orbot.app/en/download/

Neo Store

Neo Store is an F-Droid client with a modern UI and an arsenal of extra features[1][6]. It is a feature-rich F-Droid client that is UX-focused on empowering users, with fast repository sync times, awesome built-in repositories, and easy exploration of new apps[1]. Some of its key features include:

  • Beautiful light and dark themes[1][3]
  • Minimalism with KISS principles[1]
  • Fast repository syncing[1][3]
  • No cards or inappropriate animations[3]
  • Material F-Droid style[3]

Neo Store is available on F-Droid, which is a free and open-source Android app repository[2]. It is also available for download on APKMirror[3]. Additionally, it is possible to add Neo Store to your Android application by using a static library[4]. Finally, there is a separate app called “Neo” on the Google Play Store, which is exclusively for users with an existing Neo account[5].

Citations: [1] https://github.com/NeoApplications/Neo-Store [2] https://f-droid.org/en/packages/com.machiav3lli.fdroid/ [3] https://www.apkmirror.com/apk/neoapplications/neo-store-f-droid-version/neo-store-0-9-13-release/neo-store-0-9-13-android-apk-download/ [4] https://android.izzysoft.de/repo/apk/com.machiav3lli.fdroid [5] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=space.neo.app [6] https://codeberg.org/NeoApplications/Neo-Store

Proton Calendar

Proton Calendar is a planner and time-management tool that keeps your schedule private[2]. It is available for Android and iOS devices[1]. The Android app can be downloaded from the Google Play Store or directly from the Proton website as an APK file[1][4]. The app comes with a full set of advanced features and functionalities that can easily replace your existing calendar app[3]. Some of the features of the Proton Calendar app include:

  • Schedule planner that syncs automatically across browsers and devices[2]
  • Ability to create recurring events on a daily, weekly, monthly, yearly, or custom basis[2]
  • Appointment scheduler in local or foreign time zones[2]
  • Ability to manage up to 20 calendars (paid feature) [2]
  • View your agenda from the home screen with the Proton Calendar widget[2]
  • Add multiple reminders for any event[2]
  • Use as a daily planner or monthly planner by switching between different views[2]

The app is missing some features like color-coding, holidays, and contacts' birthdays[2]. However, the developers have stated that they are working on adding more features to the app in the future[5]. Collaborative sharing of calendars between Proton users is already possible in the Proton Calendar web client and Android app[5].

Citations: [1] https://proton.me/calendar/download [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=me.proton.android.calendar [3] https://proton.me/blog/calendar-android-app [4] https://protonapps.com/protoncalendar-android [5] https://apps.apple.com/us/app/proton-calendar-secure-events/id1514709943 [6] https://www.reddit.com/r/ProtonMail/comments/12ijj8s/the_proton_calendar_feature_disparity_between_ios/

Molly

Molly is a hardened fork of Signal for Android[2][4][5]. It is an independent app that uses Google's proprietary code to support some features, but the community is working to make it 100% free and open-source[1]. Molly comes in two flavors: one with proprietary blobs like Signal and one without, called Molly-FOSS[2][5]. The app is updated every two weeks to include the latest features and bug fixes from Signal, except for security issues which are patched as soon as fixes become available[2]. Molly has a passphrase lock feature that allows users to set a passphrase to secure their messages[2]. The app also locks down automatically when the user is gone for a set period of time and securely shreds RAM[1]. Molly can be downloaded from GitHub's Releases page or installed from the Molly F-Droid Repo[2].

Citations: [1] https://molly.im [2] https://github.com/mollyim/mollyim-android [3] https://www.reddit.com/r/privacytoolsIO/comments/khhzir/your_thoughts_on_molly_hardened_fork_of_signal/ [4] https://news.ycombinator.com/item?id=25743852 [5] https://lemmy.ml/post/48449 [6] https://www.saashub.com/compare-signal-vs-molly-signal-fork

SnoopSnitch

SnoopSnitch is an Android app that allows users to test the security of their mobile devices and mobile network security[1][2][3]. The app can analyze mobile radio data to detect threats like fake base stations, user tracking, and SS7 attacks[1]. It can also provide a detailed report of the patch-status of vulnerabilities (CVEs) by month[1].

SnoopSnitch requires a compatible rooted device with Qualcomm's firmware for installed or missing Android security patches to perform active network tests and attack monitoring[1]. The app asks for a number of permissions, most of which are only required for network tests and attack monitoring[1]. Users may also choose to help improve global network security and threat statistics by uploading their network measurements or security events, but SnoopSnitch will ask for confirmation before uploading any such information to their servers, and all uploads are encrypted[1].

SnoopSnitch is open-source software released under the GPLv3 license[1][3][6]. It can be downloaded from Google Play, F-Droid, Uptodown, and Soft112[1][2][4][5]. To build SnoopSnitch, the Android SDK is required[6].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=de.srlabs.snoopsnitch [2] https://f-droid.org/en/packages/de.srlabs.snoopsnitch/ [3] https://opensource.srlabs.de/projects/snoopsnitch [4] https://snoopsnitch.en.uptodown.com/android [5] https://snoopsnitch.soft112.com [6] https://github.com/srlabs/snoopsnitch

Extirpater

Extirpater is a free and open-source Android app that securely deletes files, making them irrecoverable[1][3]. It is a high-performance free space eraser, which is the first of its kind on Android[1][4]. It is recommended to use Extirpater before selling your device, after enabling encryption, or after deleting many apps/files[1].

Extirpater is developed by Divested-Mobile and is available on F-Droid[1][2][3]. It is also available on Google Play Store under the name “Shreddit – Data Eraser”[6]. The app provides features such as empty space shredding on internal and external storage, executing multiple shredding jobs on more than one storage simultaneously, and dual themes light and night mode[6]. It also provides strong integration with your device's built-in file manager or any third-party file manager[6].

Overall, Extirpater is a useful app for those who want to securely delete their data from their Android device. It is recommended to use it before selling your device or giving it away to ensure that your data is not recoverable.

Citations: [1] https://f-droid.org/en/packages/us.spotco.extirpater/ [2] https://github.com/Divested-Mobile/Extirpater [3] https://www.libhunt.com/compare-extirpater-vs-webcall-android?ref=compare [4] https://divestos.org/pages/our_apps [5] https://steemit.com/android/@aaforward/anonymity-and-emergency-data-deletion-for-smartphones [6] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.palmtronix.shreddit.v1

VLC

VLC for Android is a free and open-source cross-platform multimedia player that can play most multimedia files, as well as discs, devices, and network streaming protocols[1]. Here are some key features of the app:

  • Full audio player: VLC for Android is a full audio player, with a complete database, an equalizer, and filters, playing all weird audio formats[1].

  • Video player: VLC for Android can play any video and audio files, as well as network streams, network shares and drives, and DVD ISOs, like the desktop version of VLC[1].

  • Hardware decoding: VLC can decode video in software and hardware mode. Hardware decoding often provides better performance but is not supported on all devices. If your device Android version is below 4.3, software decoding may be the only supported option for you[2].

  • No ads: VLC is intended for everyone, is totally free, has no ads, no in-app-purchases, no spying, and is developed by passionate volunteers[1].

VLC for Android can be downloaded from the Google Play Store or from the official VLC website[1][2]. It is also available for download from third-party websites like Uptodown[4][6].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.videolan.vlc [2] https://www.videolan.org/vlc/download-android.html [3] https://www.videolan.org/vlc/ [4] https://vlc.en.uptodown.com/android [5] https://www.videolan.org [6] https://vlc.en.uptodown.com/android/download

APKUpdater

APKUpdater is an open-source tool that simplifies the process of finding updates for installed apps[1]. It provides similar functionality to an app store, but instead of depending on a single source, it aggregates the results from APKMirror, Aptoide, F-Droid, and Google Play[1][3][6]. Some of the features of APKUpdater include finding updates from various sources, finding new apps to install, scheduling background update checks, and receiving notifications when updates are found[1][3]. APKUpdater supports Android 4.0.3 to Android 10 and Android TV[1][3]. APKUpdater is available for download on various websites, including APKMirror, Uptodown, and Malavida[2][3][4]. It is an interesting application that can help keep apps updated, although the process of updating apps may not be fast or particularly easy[3].

Citations: [1] https://github.com/rumboalla/apkupdater [2] https://www.apkmirror.com/apk/rumboalla/apkupdater/ [3] https://apkupdater.en.uptodown.com/android [4] https://www.malavida.com/en/soft/apkupdater/android/ [5] https://www.techdoctoruk.com/apk-updater-2022/ [6] https://forum.xda-developers.com/t/app-4-0-3-gplv3-apkupdater-2-get-updates-for-your-apps.3444517/

ExifEraser is a free and open-source Android app that allows users to remove metadata from their images[4]. The app supports modern Android versions from 6.0 and above[4]. ExifEraser can remove embedded ICC Profile, EXIF, Photoshop Image Resources, and XMP/ExtendedXMP metadata from JPEG images[1]. The app is permissionless, meaning it does not require any special permissions to function[4]. Other apps that can remove Exif metadata from photos on Android include Photo Metadata Remover and Scrambled Exif[3][5]. Users can also use the Exif Metadata app to view and remove Exif data from their photos[2].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.none.tom.exiferaser [2] https://www.xda-developers.com/how-to-view-remove-exif-data-android-ios/ [3] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=apps.syrupy.metadatacleaner [4] https://alternativeto.net/feature/exif-removal/ [5] https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/ [6] https://listoffreeware.com/best-free-exif-remover-app-for-android/

Pocket Paint is a graphical paint editor app developed by the free and open source non-profit Catrobat project[6]. It allows users to set parts of pictures to transparent, insert text/images, add layers, use color filling and picking tools, rotate, resize and position elements, and more[1][2][3][6]. The app is available on F-Droid and Google Play Store[3][6]. The F-Droid version is built and signed by F-Droid, and guaranteed to correspond to the source tarball[1]. The app requires Android 5.0 or newer[1]. The app's license is GNU Affero General Public License v3.0 or later[1][3].

Citations: [1] https://f-droid.org/packages/org.catrobat.paintroid/ [2] https://f-droid.org/pt/packages/org.catrobat.paintroid/ [3] https://github.com/Catrobat/Paintroid [4] https://news.ycombinator.com/item?id=34799272 [5] https://gitlab.com/fdroid/rfp/-/issues/1042 [6] https://alternativeto.net/software/pocket-paint/about/

OnionShare is an open-source tool that allows users to securely and anonymously share files, host websites, and chat with friends using the Tor network[1][5]. OnionShare has a mobile beta version available for download, but it is still in early alpha/beta state and has not yet been audited[2]. The OnionShare Android app is available for download on the Google Play Store[3]. The Android version of OnionShare is still under development and is available on GitHub[4]. To learn more about how OnionShare works, its security properties, how to use it, and how to contribute to the project, users can check out the documentation available on the OnionShare website[5].

Citations: [1] https://onionshare.org [2] https://onionshare.org/mobile/ [3] https://play.google.com/store/apps/details?hl=en_US&id=org.onionshare.android [4] https://github.com/onionshare/onionshare-android [5] https://github.com/onionshare/onionshare [6] https://apkcombo.com/onionshare/org.onionshare.android/

Mullvad VPN offers several options for Android users to connect to their VPN service[1][2]. Here are the different app options:

  • Mullvad VPN app (Android 8 or later): This is the easiest app to use and uses the WireGuard protocol exclusively. Users can log in with their Mullvad account number and change locations using an always-updated server list[1][2].

  • WireGuard app (Android 5 or later): Users can use the official WireGuard app for Android if the Mullvad app is not optimal for them[1][2].

  • OpenVPN for Android app (Android 4 or later): Users can follow a guide to use the OpenVPN for Android app if they cannot use the Mullvad VPN app[1].

To install the Mullvad VPN app on Android, users can download it from the Google Play Store[3]. Once installed, users can follow a guide to learn how to use the app[4]. The app also allows users to submit support requests directly in the app and has a no-logging of user activity policy[2].

Citations: [1] https://mullvad.net/en/help/installing-mullvad-android-devices/ [2] https://mullvad.net/en/download/vpn/android [3] https://mullvad.net/en/help/install-mullvad-app-android/ [4] https://mullvad.net/en/help/using-mullvad-vpn-on-android/ [5] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=net.mullvad.mullvadvpn [6] https://play.google.com/store/apps/developer?gl=US&hl=en_US&id=Mullvad+VPN

Silenc

Silence is a free and open-source SMS/MMS application that provides end-to-end encryption for your messages using the Signal encryption protocol[1][2]. It is a full replacement for the default text messaging application, and all messages are encrypted locally[1]. Silence works like any other SMS application, and there's nothing to sign up for or any new service your friends need to join[1][2]. Silence communicates using encrypted SMS messages, and no servers or internet connection is required[1][2]. All messages are encrypted locally, so if your phone is lost or stolen, your messages are protected[1][2]. Silence is made by volunteers, and it is free and open-source, enabling anyone to verify its security by auditing the code[1][2].

Citations: [1] https://silence.im [2] https://github.com/SilenceIM/Silence [3] https://www.reddit.com/r/fossdroid/comments/y3wytx/partisansms_encrypted_sms_messenger_for_android/ [4] https://silence.im/faq [5] https://git.silence.dev/Silence/Silence-Android/-/issues/597 [6] https://youtube.com/watch?v=aePo5CbjtEw

Note: It is important to note that while these apps may be useful for privacy and security, it is always important to research and evaluate them before using them to ensure they meet your specific needs and requirements.

OpenAndroidInstaller is a website that provides a simple solution for installing alternative Android distributions like LineageOS[3]. The website provides instructions on how to run the application, which can be downloaded as an .exe, flatpak, or appropriate executable file for your OS[1]. The website also provides a list of supported devices[3]. According to a Reddit post, OpenAndroidInstaller makes installing alternative Android distributions easy[2]. However, it's important to note that custom ROMs can be difficult for beginners[2]. Additionally, the Android Developers website provides information on building apps that give users seamless experiences across different devices[4]. The Free Software Foundation Europe provides information on how to regain control of your data with a free operating system and free apps[5]. Finally, the WordPress website provides information on how to build a custom Android ROM using the Android Open Source Project (AOSP) [6].

Citations: [1] https://openandroidinstaller.org [2] https://www.reddit.com/r/Android/comments/z950lj/openandroidinstaller_makes_installing_alternative/ [3] https://openandroidinstaller.org/supported-devices.html [4] https://developer.android.com/reference/android/content/pm/PackageInstaller [5] https://fsfe.org/activities/android/liberate.en.html [6] https://talentica.wordpress.com/2018/06/20/build-a-custom-android-rom-using-android-open-source-projectaosp/

Nichts!

Warum ich mich nicht melde, fragtest du dich?

Nicht?

Ich wollte, ich könnte.

Ich wollte dich nicht verletzen. Ich wollte, ich könnte mich mit dir vernetzen. Doch die Gesetze. Derer, die ich absprach, jener.

Sie banden mich einem Bannsiegel gleich und versiegelten meine Lippen unweich.

Ich konnte nicht, meine Worte fehlten. Der graue Nebel der Melancholie legte sich wie ein Nervengas auf mich, und alles drum herum verschloss sich.

Wermut

Ach du holdes und nobles Wesen. Wo warst du nur gewesen?

Ich wünschte, das Schicksal hätte uns früher miteinander verbunden. Ich wünschte, wir beide wären nicht verbrannt und entschwunden.

Die dumme Tristesse des Verneinens. Dumpfer lamentierender Klang des Todesschlafes. Sie sind für uns auf ewig unsere Begleiter.

Denn im Leben gibt es nur die Endlichkeit als Wegbereiter. Und trotz dem Wermut und trotz dem unheilsamen Herzen.

Danke ich dir für dein Vertrauen, Gesten und deinen Glauben und die Schmerzen. Auch wenn es nicht fruchtet, liebe ich dich auf ewig und liege bei dir.

Ghul

Einem Ghul gleich wandelte ich unter den Lebendigen wie ein Toter. Bis mich dein Schein traf.

Deine Wärme, dein kleines trauriges Herz, deine Liebe. Belebte mich aufs Neue. Ich dachte, wir schenkten uns die Treue. Doch alles verging ohne Reue.

Es war nicht genug, es war nicht klug. Es war wie ein Feuer, das in der bitteren Nacht die wuchernden Narben aus mir verbannte.

Nichtsdestotrotz oder trotzdem.

Wollte ich dich wiedersehen, wollte ich mich mit dir verbinden, wollte ich nicht dem Leben entschwinden. Aber nein. Du bist du, und ich bin mein

The best Apple IOS and MacOS accessibility reading software for visually impaired people are VoiceOver and Zoom. VoiceOver is a built-in screen reader that describes what's happening on your device so you can navigate by listening and performing gestures[2][3][4]. It can speak what’s on the screen, and the text in documents, webpages, and windows. With VoiceOver, you can control your Mac with the keyboard, trackpad gestures, or a refreshable braille display. To customize VoiceOver, use VoiceOver Utility[3]. Zoom is a built-in screen magnifier that makes it easier to see what’s on the screen[3][4]. It offers additional screen magnification and screen reader features to the OS X operating system[4]. Ai Squared also offers a low-vision product called ZoomText Mac, which offers additional screen magnification and screen reader features to the OS X operating system[4].

Citations:

[1] https://www.apple.com/accessibility/vision/ [2] https://support.apple.com/en-us/HT210076 [3] https://support.apple.com/guide/mac-help/vision-mchl67c83f41/mac [4] https://www.afb.org/blindness-and-low-vision/using-technology/using-computer/part-ii-experienced-computer-user-new-3 [5] https://www.apple.com/newsroom/2022/05/apple-previews-innovative-accessibility-features/ [6] https://www.reddit.com/r/accessibility/comments/lnxt02/ios_apps_for_the_blind_and_visually_impaired_i_am/

Hack the planet! :)

Click Here to Watch the Video

In an era where our every move is tracked and monetized by corporations, privacy has become a precious commodity. In a move to empower users and restore their digital autonomy, the Cult of the Dead Cow, an Infosec super-band, has unveiled Veilid (pronounced vay-lid), a groundbreaking open-source project that promises to revolutionize the way applications communicate. Veilid enables apps to connect and exchange information in a secure and private peer-to-peer manner, free from the grasp of centralized, corporate-owned systems. In this blog post, we'll dive into the details of Veilid and how it could be a game-changer in the fight against surveillance capitalism.

The Birth of Veilid

Katelyn “medus4” Bowden and Christien “DilDog” Rioux recently presented Veilid at DEF CON, shedding light on the technical marvel that took three years to develop. This innovative system, primarily coded in Rust with contributions from Dart and Python, draws inspiration from both the Tor anonymizing service and the peer-to-peer InterPlanetary File System (IPFS). The fundamental idea behind Veilid is to enable applications on various platforms, including mobile, desktop, web, and headless, to communicate privately and securely over the internet, without revealing their users' IP addresses or locations.

Unlike traditional networking systems, Veilid ensures that even the app makers themselves cannot access this sensitive information. The project's design is well-documented and open-source, released under the Mozilla Public License Version 2.0, emphasizing transparency and community-driven development.

A Hybrid of Privacy and Performance

Veilid's uniqueness lies in its fusion of the best elements from Tor and IPFS. While Tor focuses on privacy but may suffer from performance issues, and IPFS leans towards decentralization without prioritizing privacy, Veilid strikes a delicate balance. Notably, unlike Tor, Veilid doesn't rely on exit nodes, making each node in the network equal. This makes it exponentially harder for any entity, including intelligence agencies like the NSA, to monitor Veilid users, as they would need to surveil the entire network.

As Rioux aptly puts it, Veilid is “like Tor and IPFS had sex and produced this thing.” The possibilities it opens up are limitless, with Bowden emphasizing the equality of all nodes and the strength of the network being as robust as its weakest link.

Key Features and Security Measures

Veilid operates by having each copy of an app that integrates the core Veilid library act as a network node. These nodes communicate with each other using 256-bit public keys as identifiers, ensuring that there are no special nodes or single points of failure. Veilid supports a wide range of platforms, including Linux, macOS, Windows, Android, iOS, and web apps, making it highly versatile.

Security is paramount in Veilid's design. It employs both UDP and TCP for communication, with connections authenticated, timestamped, end-to-end encrypted, and digitally signed to thwart eavesdropping, tampering, and impersonation. The cryptographic mechanisms, collectively referred to as VLD0, rely on well-established algorithms to avoid introducing vulnerabilities. These include XChaCha20-Poly1305 for encryption, Elliptic curve25519 for public-private-key authentication and signing, x25519 for DH key exchange, BLAKE3 for cryptographic hashing, and Argon2 for password hash generation. The system even ensures that files written to local storage are fully encrypted.

Flipping Off Surveillance Capitalism

In a world where IP addresses are sold, data is tracked relentlessly, and surveillance capitalism thrives, Veilid is a beacon of hope. It erases the need for IP addresses, prevents tracking, data collection, and monetization of user information. This is a significant stride toward dismantling the surveillance capitalism economy that profits from exploiting users' online activities.

As Bowden passionately states, “Billionaires are trying to monetize those connections, and a lot of people are falling for that. We have to make sure this is available.” The goal is for applications to seamlessly incorporate Veilid, allowing users to benefit from the network without needing to understand the technical intricacies. One notable example is VeilidChat, a secure instant-messaging app built using the Veilid framework, akin to Signal.

Conclusion

Veilid's release marks a significant step towards reclaiming digital privacy and autonomy. While previous attempts to challenge the surveillance capitalism economy have met with mixed results, the Cult of the Dead Cow's reputation for getting things right suggests that Veilid could be the catalyst for real change. With its commitment to security, privacy, and decentralization, Veilid has the potential to empower users and reshape the future of digital communication. As it gains momentum, it may well flip off the surveillance economy for good, putting the power back in the hands of the people where it belongs.

https://veilid.com/

https://gitlab.com/veilid/veilid

https://cultdeadcow.com/tools/

A tool to remove operating systems, whether Windows or Linux, with just one click.

https://help.ubuntu.com/community/OS-Uninstaller

https://sourceforge.net/p/os-uninstaller/wiki/Home/

“Lull yourself to sleep with the soothing white noise of your favorite tech giant’s terms of service. Close your eyes, drift away, or scroll down to join the 1% of technology users that claim to have read em’ from beginning to end.*”

https://www.zzzuckerberg.com/

https://www.zzzuckerberg.com/zzzhang