Herd Protect – Cloud Antivirus with 68 scanning engines

Update: As of February 26 2017, Herd Protect has temporarily disabled downloads of their Herd Protect antivirus software. We have both the portable and full installation .exe file available for download from the link button below.   Herd Protect is a free cloud antivirus which utilizes 68 antivirus engines to scan your hard drive for malicious content. […]

UnaPhone Zenith – Secure and Private Smartphone

ETP
0
0
317
The UnaPhone is one of the few Android phones on the market which focus on privacy and security for your data and communications. UnaPhone comes without Google facing apps and services giving you a clean operating system without call backs, and data being sent without your knowledge. Below is a list of more details about […]

Encrypted Email Services List

ETP
0
0
198
Below is a list of encrypted email services which provide a higher level of security & privacy while not sacrificing ease of use. This list will be updated when new services are known. We take certain criteria into consideration when listing a service, not limited to: Physical jurisdiction, open source, strong privacy policy, zero knowledge […]

SCRYPTmail – Encrypted Email Service

SCRYPTmail is a relatively new encrypted email serivice launched on November 18, 2014. It is an open-source encrypted email web service with a focus on security and user privacy. You can use SCRYPTmail on any device which supports modern browsers like Chrome or Firefox. Currently there is no dedicated app for iOS or Android and no support for […]

Manage your Hosts file with software tools

Block Website “Block Website” is a simple and effective hosts file manager which allows for quick and easy commenting and uncommenting (turning on and off) addresses to be blocked. If you like to use your hosts file to block websites, ads and perhaps Windows 10 spying, Block Website hosts manager might make your task a […]

NordVPN – Multihop With TOR

Nord VPN is based in and operates under the jurisdiction of Panama. Roberto Vega Senior Support Manager for Nord VPN explains how their VPN service and  encryption works:   For OpenVPN protocol we allow peers to authenticate each other using username and password, certificates, or a pre-shared secret key. When used in a multi-client server […]

Wanted: Cryptography Products for Worldwide Survey

ETP Note: Originally From Bruce Schneier’s 15 December 2015 Cryptogram. This is an ongoing collection of encryption software and encryption service providers around the world. (If the iframe wont load below or the Google document is down, you can download this document). In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US […]