👁️👄👁️
link
fedilink
English
11
edit-2
1Y

A hammer

Also these are privacy apps, not cyber security

nmap

My favorite cybersecurity tool is the clue-by-four. I apply it directly to Layer 8 problems.

Enkrod
link
fedilink
English
21Y

I see you know how to deal with ID-10t errors.

I’m not really seeing much in the way of cybersecurity tools in this thread. These are all FOSS and usable without extra cost (although some have paid upgrades)

@mqvisionary@lemmy.ml
link
fedilink
English
251Y

Joplin, a note taking app… and is that obsidian icon under it? The picture is so dumb.

@kugiyasan@lemmy.one
link
fedilink
English
181Y

Why is Obsidian on the list?? How is a closed source electron app for editing markdown files a good cybersecurity tool/privacy respecting? I could use nano to do the same job with much more confidence for my privacy.

@online@lemmy.ml
link
fedilink
English
11Y

Tbh I don’t think that’s a list. I think that’s just their website’s graphic banner thing and they slapped it on.

I’m not sure I follow the closed source bit. For example, Virus Total is closed source but a something used by cybersecurity professionals across the world. Most of the software that powers cloud giants is closed source and security professionals everywhere accept the shared security model.

Closed source matters for encryption, not necessarily tooling. It’s a red herring unless you’re talking about a tool’s ability to encrypt/decrypt.

Chemical Wonka
link
fedilink
English
311Y

Brave is far from being a cybersecurity tool

My favorites tools in this image is Aegis and Signal

@Zoidberg@lemm.ee
link
fedilink
English
31Y

I have to say my faith in signal has been shattered since I got crosstalk on a signal conversation. I still can’t imagine how that’s possible but it was there, clear as day.

kadotux
link
fedilink
English
21Y

Please elaborate?

Chemical Wonka
link
fedilink
English
11Y

Explain more I didn’t undestand you.

Ublock Origin as ads have lots of malware these days and browsing the internet is a normal occurance. I think looking at it that way it gets used far more than any other tool.

@akilou@sh.itjust.works
link
fedilink
English
71Y

I use Firefox, Proton everything, Signal (for the 4 contacts who have it). I guess that’s it.

I try to use Plex as much as possible instead of streaming services…?

Vexz
link
fedilink
2
edit-2
1Y

Sadly Plex collects some data about its users. I remember opting out of some telemetry stuff but I can’t remember where that was. If you want a self-hosted streaming service like Plex that completely respects your privacy, Jellyfin is what you’re looking for. I tried it and it’s okay but not as good as Plex imo. But if your main focus is privacy then you should definitely check it out. It’s FOSS.

Edit:
I found where I had to opt out some data collection for Plex. Open this site, scroll halfway down the page. You’lle see two checkboxes for “Send playback data to Plex” and “Advertising Consent”.

@akilou@sh.itjust.works
link
fedilink
English
21Y

Yeah I tried Jellyfin too but Plex is much better. I just threw it in the list because I figured it was better than having a bunch of video and music streaming services.

@Mandy@sh.itjust.works
link
fedilink
English
261Y

that seems like a pretty random selection of things honestly, what qualifies as a cybersecurity tool? hows vivaldi a part of that? or openotp?

@whale@lemm.ee
link
fedilink
English
21Y

deleted by creator

@sir_reginald@lemmy.world
link
fedilink
English
52
edit-2
1Y

half of these are not even barely security related.

and if you meant privacy, well, definitely none of the images either. SimpleX, SearXNG, Tor and I2P

PS: I find it hilarious that you include proprietary software like Vivaldi or Obsidian. That is how flawed this post is.

Hellfire103
link
fedilink
English
11Y

I have a page on my Gemini capsule with a list of the software I use. Ask away about my reasons for any of the entries.

Gemini | HTTPS

I also quite like LUKS, VeraCrypt, and geli(8) for disk encryption, and I use mainly physical media (e.g. CDs) for music and video.

@sumikko@infosec.pub
link
fedilink
English
21Y

ffuf, hashcat, burpsuite and linpeas

Onii-Chan
link
fedilink
151Y

GrapheneOS, Signal, Vanadium, Mullvad VPN, extremely strict permissions. I don’t do much with my phone, but I still need to know I’m in control of my privacy.

Norgur
link
fedilink
131Y

my favourite “Cyber-Security-Tool”? None of those logos up there qualify for that descrption… well… Authy perhaps…
yet, my favourite “Cyber-Security-Tools” would be
Configs:

environment:
- PUID=110XX
- PGID=110XX
- UMASK=002

PasswordAuthentication no
PermitRootLogin no

Software:

  • Restic
  • Bitwarden
Create a post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

  • 1 user online
  • 4 users / day
  • 34 users / week
  • 91 users / month
  • 1.14K users / 6 months
  • 1 subscriber
  • 661 Posts
  • 11.1K Comments
  • Modlog