write.privacytools.io

Reader

Read the latest posts from write.privacytools.io.

from tea01417

1周年

いつの間にか1年過ぎてました^^; ここまで閲覧していただき、ありがとうございました(__) いや、メモ帳みたいなものだけどね^^; 何かの縁でここに辿り着いたあなた、他言無用ひっそりと閲覧していって下さい。 内容の信憑性など一切保証しません><

1年振り返ってみてほとんどFXの記事ばかり、ただ週次で記事は削除してたけど。 あとはPC関連のTipsだけどネタ的に使いまわしのような記事が多かったかな。 ハードは5年以上構成変わってない、OSやアプリも特に革新的なものを扱ったこともなくゲームもしないし… 機能的にはもう結構前から必要十分、蛇足みたいな記事のほうが目立ってたりして^^; あと米中関連とアレに振り回されたかな。

 
Read more...

from tea01417

iOS 14.0.1

iPhone6sにてアップデートを行いました。 1時間弱で完了(DLは有線LANで2.5GB程度10分くらい)、動作は変化なし、今のところ不具合もなし。 ストレージの使用領域は1-2GB増加したかな。 16GBモデルなのでさすがに手狭な気がしてきた^^; プライバシーに関連する設定が増えてたり、設定がいくつか巻き戻ったりしていました。 Bluetoothはこれまでアップデート時は強制オンでしたっけ? (メジャーアップデートだからか) 新しいアプリとして翻訳機能が見受けられました。 カメラアプリを起動すると右端に小さな緑の点でインジが動作していました。 接触通知はデフォルトでオフでした。 Appライブラリの停止方法は?

今回13.3.1からアップデートしたが個人的には特に利便性の向上はなし (カメラのインジは有用そうだけどカメラは内外とも塞いでいる)。 ほぼ何も入ってない待ち受け端末だから^^;

 
Read more...

from tea01417

ISP←DNSサーバー(DNSプロバイダ)

ログは数か月だかそれ以上保存されているらしいです。 国外ではログが売買されているらしいですね。 国内も法改正でどうにかなってたりするのでしょうか?

フリーでプライバシー重視だったり高速だったりするものも多数あります。 1.1.1.1や8.8.8.8とか… 1.1.1.1はところによってはプライバシー重視なDNSサーバーとして扱ってない場合もあります(24時間は保管されている?)。 変更方法は他サイト様を参照してください。 ブラウザのほうで暗号化?(dns over https)の設定がある場合、DNSサーバーが対応している必要があった気がします。

そう言えばHTTP/3はどうなったのでしょうか? 開発版?には取り入れられてたような、よく知りませんが。

追記 OSやブラウザ、その他アプリの設定を行った上で… 上記DNSサーバーの変更、VPNの導入、通信制限(ドメインやIPアドレス)、 リファラーやフィンガープリント、トラッキングの遮断や偽装とかかな簡単なのは。 Torも効果あるかも。 解析されるとしたらプロバイダ、PC内やその設定、通信先のログなど。 そこら辺りを意識かな。

追記 書いてるとき知識がDNSサーバー=ISPになってました。 WinとLinuxともに長く1.1.1.1使ってるけどトラブルはなし。

 
Read more...

from tea01417

モニター

21.5”FHDモニター(σ・∀・)σゲッツ!! お値段ナント送料込み3kナリ(゚Д゚;) 中古品だけどね^^; 5画面復活! これで大統領選に向けて準備万端だ^^

…経費って何ですか?><

余談だけど4kでも新品で20k台から、中古で10k半ばからというところか。 お安い気もするけどサイズ的にどうだろ? 複数チャート監視用に1枚ほしい気もするけど^^; 繋がるポートあったかな?>< GTX750Tiだけど^^;

しかし今は拘らなければそれなりのモノがPCでもスマホでもお安く手に入りますね^^ …ここはテム・レイやガデム大尉の残留思念が渦巻いているブログ><

…今日は調和のとれた記事が書けた^^

追記 モニターが届きました。 さっそく接続、発色も良好でかなり状態の良いものでした。 (たしか1ドット表示不良だったかな)

BenQ+Acer x4構成 トレードしてそうでしょ? 一応トレーダーだから^^;

 
Read more...

from tea01417

/e/

プライバシー重視のカスタムROMです。 実際にインストールしたり何度か紹介しています。 今回は機能についてではありません。 そこの標語…

Your Data is YOUR Data !

まあ、そういうことです。 大事なことです。 近年は金脈的にもなってます。 自分の情報は自分で守りましょう! と言うか守らねばなりません! 必要ないなら極力晒さないこと! また作らない、時に決断しないことも必要かも (自ら制約を設けることは時に不利となる場合がある、主張や行動なども)。 こういった認識はプログラミングなどより重要です。 決して軽視してはいけません。 もしかしたら素晴らしい将来が台無しになってしまう場合だってあるかもしれません。 また、一見賛美しながらも自らは鉄壁のガードを誇り、相手を蹴落とす機会を虎視眈々と狙っている輩もどこかに潜んでいるかもしれません。

…しかし/e/はマイナーなままな気がする^^;

補足 上記標語はここでは/e/の意図するところとは異なります。 ここではネットに自ら公開する個人情報のこと指しその危険性について述べたものです。 公開した時点で自分の手を離れ独り歩きします。 他人が切り貼りしたり印象を操作して別のものとして扱うことも当然可能です。

 
Read more...

from MicroRyo

Shiver me timbers!

Ahoy ye landlubbers. It's Talk Like a Pirate Day !

I heard of magic boxes, that show ya ol' pirate adventures. Me will use it. Arrr! Wish ya a big booty today!
 
Weiterlesen...

from Shepaconoid PL

“Służby Izraela zachwycają się naszą kryptografią. Polski Usecrypt trafił na listę rekomendowanych aplikacji izraelskiego MON-u”

“Usecrypt Messenger to polski komunikator, który uznawany jest za jeden z lepszych, bezpiecznych komunikatorów internetowych. Renoma ta została właśnie potwierdzona przez Ministerstwo Obrony Izreala, które zarekomendowało ją jako bezpieczny komunikator dla tamtejszych instytucji publicznych.”

Tak twierdzi portal spidersweb.pl. Niestety nie jest to prawda. Bezpieczeństwa usecryptu nie da się potwierdzić , ponieważ jest on zamknięto źródłowy.

“— Usecrypt Messenger wykrywa i uniemożliwia nieautoryzowany dostęp do aplikacji zabezpieczając ją przed atakami hackerów i malware’em. W obliczu rosnącej liczby ataków oraz masowej inwigilacji, Usecrypt zapewnia poufność czatów oraz połączeń głosowych, dzięki opatentowanej technologii niezależnego szyfrowania oraz kontroli bezpieczeństwa aplikacji” – mówi Yuval Rabin, partner w funduszu Lazar”

To również nie jest prawda. Nie ma na to dowodów bo apka jest zamknięto źródłowa.

Usecrypt ssie i nie powinien być używany.

 
Czytaj dalej...

from MicroRyo

Tagebücher per Hand kopieren

Stapel voll Tagebücher warten um per Hand kopiert zu werden. Und dabei natürlich auch zusammengefasst und kommentiert. Unglaublich wie sich Menschen wandeln können. Da muss natürlich viel getan werden. Ich denke diese Sache wird lange dauern. Aber diese ganzen vertstreuten Einblicke müssen archiviert werden. Dann wird alles zusätzlich digitalisiert zusammen mit der neuen Fassung und den Anmerkungen.

 
Weiterlesen...

from Right to privacy

Google crossed logo

Today our mobile devices have become a necessity. These mobile devices provide various services using the internet and run on a software called the operating system. This operating system is provided by two major players as of today i.e., Google’s Android and Apple’s iOS. Now if you have logged in your Google account in your android phone, this tutorial is for you. We will be taking some small steps in improving the privacy you have on your phone but surprisingly most people don’t know about this. Get ready with your mobile device and I would recommend to open this page in your computer so that you can easily follow along.

Note — Some of Google’s features and personalizations will not work after following this tutorial.


Step 1

Open your phone settings, and search for the “Accounts” item. This might vary from brands to brands and from android version to version. My device shown below is running Android 10.

1

Step 2

After you select the “Accounts” section, you must see a list of accounts various apps are using on your phone. There must also be one or more google accounts. Tap on any of them if you have more than one account, you will have to repeat the process for each account.

2

Step 3

Once you tap on the account, you should see two options (shown on the left image). Tap on “Google Account” as indicated in the screenshot above. You should enter a new window (shown in the right image).

Step 4

Under “Privacy & personalization”, tap on “Manage your data & personalization”, you should see a screen similar to the one shown below:

Step 5

Tap on “Manage your activity controls”, you should see the screen shown below. Now tap on “Web & App Activity” toggle, you should see a screen prompting you to “PAUSE” or “CANCEL”:

Step 6

Press pause (two times) and the screen should dismiss and the toggle for “Web & App Activity (paused)” must be in off position.

Step 7

Similarly, scroll down to “Location History” and tap on its toggle, you should see a similar toggle. Tapping on it would again show the prompt asking you for “PAUSE” or “CANCEL”. Tap on pause (two times). The toggle for “Location History (paused)” must be in off position.

Step 8

Repeat the process for “Youtube History”. Tap on its toggle and you will be prompted again for “PAUSE” or “CANCEL”, tap on “PAUSE” and the toggle for “Youtube History (paused)” must be in off position. Image for post

Step 9

Press the back button on the top right of your screen. You should be in “Data & personalization” section. Scroll down to “Ad personalization” and tap on “Go to ad settings”. A new window like the one shown below must be visible:

Step 10

Tap on the toggle “Ad personalization is ON”, a pop-up prompting you to “Keep on” or “Turn off” should be visible. Tap on “Turn off”.

Let it save the settings. A pop-up should be visible, tap on “Got it”, the toggle for “Ad personalization is OFF” must be in off position.


That’s it! You have taken the first steps towards improving your privacy. This tutorial is just one of the many I will be making, so stay tuned.

This blog would not be possible without open source projects like PrivacyTools who bring this blog online and WriteFreely, the developers of this blogging platform. Please consider donating to these platforms that empower people to voice their opinion.

 
Read more...

from Right to privacy

Google Chrome

I know, I know. You are tired of privacy advocates telling you to quit Google Chrome. I see your situation; you need Chrome to get work done. You have reasons to use it and I recognize that. I don’t want to push you to make compromises with work by using a slow or incompatible browser, but I don’t want you to give up on privacy either. So open up Google Chrome and follow along with me to make it privacy respecting.

Step 1 – Launch settings

Launch “Settings” from the menu on the rightmost corner of your search bar. You should a screen like the one below:

Chrome Settings

Step 2 – Sync and Google Services

Click on “Sync and Google Services” option, you should a see a page similar to the below:

Sync and Google Services

Step 3 – Other Google services

Under the heading “Other Google services”, you must see some switches, which when on gives a lot of data to Google and has nothing to do with the primary operation of the browser. I recommend turning them all off. Perform a “Relaunch”, if Chrome requests for it after turning off all the switches. Your settings should look like this:

Other Google services toggles on Other Google services toggles off

Step 4 – Passwords

Go back to the main settings and under the “Auto-fill” section, click on “Passwords” option.

Passwords

I don't recommend storing passwords in browser because they are easily accessible if someone knows your computer's password. In place of that I recommend using password managers like KeepassXC or Bitwarden. If you are not comfortable you can skip to the next step but do keep a strong password on your computer and don't share it with people you don't trust.

After turning these options off, it should look like below:

Store passwords on Store passwords off

Step 5 – Payment methods

Go back to the main settings and under the “Auto-fill” section, click on “Payment methods” option.

Payment methods

Trust me, you don't want your payment and stuff stored here or anywhere. It is better to keep this in your memory or write it in a diary. Again as I said earlier, anyone with access to your computer's password can see this information.

After turning these options off, it should look like below:

Store payment methods on Store payment methods off

Step 6 – Addresses and more

Go back to the main settings and under the “Auto-fill” section, click on “Addresses and more” option.

Addresses and more

Not as critical as passwords and payment methods but still I feel it is pretty sensitive data. It can be misused, so I recommend turning these all off.

After turning these options off, it should look like below:

Store addresses and more on Store addresses and more off

Step 7 – Cookies and other site data

Cookies are small packets of data that store information for the functioning of websites. These are misused by tracking websites to uniquely identify you and build a profile about your preferences.

Go back to the main settings and under the “Privacy and security” section, click on “Cookies and other site data” option.

Cookies and other site data

Chrome by default uses this option “Block third-party cookies in Incognito”. I recommend to select “Block third-party cookies” option which enables the only websites that you actually visit to store information in the form of cookies. Note that some websites may break after selecting this option. I have tested Google and Microsoft domains and they work fine.

Block third-party cookies in Incognito enabled Block third-party cookies enabled

Scroll down and you should see 3 toggles:

3 toggles for cookies

  1. Clear cookies and site data when you quit Chrome – Cookies are by default stored to keep you logged in but trackers misuse this information. Turn this on but remember you will have to login into accounts every time you exit Chrome.

  2. Send a ‘Do Not Track’ request with your browsing traffic – Turn this option off. Although a feature that has a good intention, most trackers count this option for uniquely identifying you.

  3. Preload pages for faster browsing and searching – Turn this off. This option, when enabled, preloads the webpages for a faster browsing experience. The issue is that it bypasses content blockers. This is why extensions like uBlock Origin disable this feature.

3 toggles for cookies configured right

Step 8 – Site settings

Go back to main menu and now select “Site settings” option.

Site settings option

Scroll down and you should see a list of various permissions like the one below:

Permissions

Check what websites you have given sensitive permissions like location, camera and microphone. You can also turn off notifications that you find annoying.

Step 9 – Search engine

Go back to main settings and you should see a “Search engine” section. You obviously know the default search engine which is Google.

Google default search engine

You can try out Duckduckgo which is available in the selection menu. I have been using it for a year now and I find it usable. If you don't like it, there are a lot of search engines like Startpage, Searx, Mojeek, Qwant, YaCy and MetaGer. There is no reason for you to use Google, there are very great alternatives available.

Duckduckgo search engine selected

Step 10 – Advanced Settings

In the navigation bar on the left, you should see an “Advanced” section. Expand it and select “System” option under this section.

Advanced System option

I recommend turning off “Continue running background apps when Google Chrome is closed” if you don't need Chrome running in the background.

Chrome in background on Chrome in background off

Some more suggestions

These were the settings that you can do to make Chrome privacy friendly. There are also advanced features like profiles that you can use to isolate work and personal browsing activities. You can also install extensions like uBlock Origin, Privacy Badger, Decentraleyes, etc to further avoid malicious trackers.

Well that's about it, also do checkout my post on limiting Google's tracking which will further enhance your privacy.


This blog would not be possible without open source projects like PrivacyTools who bring this blog online and WriteFreely, the developers of this blogging platform. Please consider donating to these platforms that empower people to voice their opinion.

 
Read more...

from Curva do Rio – onde tudo que não presta vai parar

Maurício Reis não tem emprego, não é empresário, não tem pais ricos, não tem herança. Então ele vive de que? Vive de uma atividade criminosa que é uma falsa fundação Chamada Nossa Senhora Aparecida. Esta fundação é dona da Rádio Cidade. Acontece que o Maurício Reis desvia 100% de todo o dinheiro que entra na fundação. Embora ela exista há mais de 20 anos, nunca aumentou seu patrimônio em um centavo. Enquanto isto Maurício Reis fica rico. Mas tudo em nome de laranjas. Não tem nem mesmo um cachorrinho sarnento em nome próprio. Não tem nem conta bancária. Tudo em nome de laranjas.

Maurício Reis vive desta atividade criminosa faz mais de 20 anos e agora ele diz que quer ser prefeito de Bom Despacho. Como uma pessoa que vive de atividade criminosa há tantas décadas pode querer administrar uma cidade? A Prefeitura não é a farsa chamada Fundação Nossa Senhora Aparecida?

Ele roubou até a própria fundação. Segundo o ex-prefeito Haroldo Queiroz divulgou em redes sociais, foi ele quem criou a Rádio Cidade, mas o Maurício roubou dele!

Nem imposto ele paga. Quem quiser a prova, é só consultar os processos contra ele. Abaixo segue um exemplo. Maurício Reis 2020


Mande sua contribuição para a Curva do Rio: osombra@mailfence.com

 
Read more...

from Curva do Rio – onde tudo que não presta vai parar

A Caçadora de Marajás de Bom Despacho. A Collor de saias.

Joice – Doa a quem doer? Que cara de pau!

A cara de pau da candidata Joice não tem limites. Prá começar, está fazendo campanha eleitoral descarada, o que a lei proíbe. Depois, ela tem coragem de dizer em sua campanha antecipada que vai cortar privilégios doa a quem doer. Quanta falsidade!

O primeiro ato da candidata Joice quando assumiu a presidência da Câmara de vereadores foi nomeadar a própria cunhada como assessora! Em quase dois anos de presidência, não cortou um só privilégio. Pelo contrarário, aumentou.

Primeiro ato: Seu primeiro ato como presidente da Câmara, em 1º de janeiro de 2019, foi colocar a cunhada como assessora. Assessora de quê? A câmara já tem muitos servidores subutilizados. E tinha e tem um procurador. O cargo de assessora, que nem existia, foi criado para empregar a cunhada.

Segundo ato: gastou uma nota preta enfeitando o seu gabinete na câmara. Colocou armários novos e chiques só para uso próprio.

Terceiro ato: Deu aumento de salários e um monte de privilégios para os servidores da câmara.

Quarto ato: manteve os servidores em meio expediente. Eles recebem (e recebem muito bem!) para trabalhar 8 horas. É este o expediente que está na lei, mas a presidente, para angariar votos entre eles, deixa que trabalham apenas 6 horas (de meio dia às 6).

Quinto ato: Como presidente da câmara, não deixou que fosse aprovado o novo regulamento do BDPREV. Com isto, o cidadão vai ter que desembolsar mais algumas centenas de milhares de reais por mês para pagar a previdência dos servidores municipais. Este é um grande prejuízo para o cidadão que vai pagar com seus impostos a generosidade da candidata.

Sexto ato: a candidata já foi a todas as unidades básicas de saúde e prometeu cargos, gratificações e aumentos de salários para todas as coordenadoras (de onde virá este dinheiro?).

A viúva pródiga

Quando morreu, Dr. Marco Túlio deixou para a candidata duas boas pensões, fazendas, casas, 30% de participação na hemodiálise. Menos de 4 anos depois, ela já vendeu a metade da participação na hemodiálise, vendeu a metade das fazendas e colocou casas às venda. Se ainda não torrou tudo, foi porque a família do Dr. Marco Túlio interferiu e não deixou. É esta a pessoa que quer administrar o dinheiro do bom-despachense e fala em cortar privilégios doa em quem doer?

Será ela o novo Collor de saia? Para quem não se lembra, ele foi oi famoso caçador de marajás, aquele que ía cassar os privilégios de todos. Deu no que que deu!

Com o exemplo que ela deu no primeiro dia de comando na Câmara, já dá para sentir o que ela faria se fosse eleita prefeita: ia levar não apenas a cunhada, mas a família inteira para a prefeitura. Joice

Cunhadinha nomeada assessora da presidente no primeiro dia de presidência.

 
Read more...

from Curva do Rio – onde tudo que não presta vai parar

Ser gay não é defeito nem crime e as escolhas sexuais que cada um faz não é da conta de ninguém. Ficar no armário também não é crime e se o gay prefere ficar escondido e ter vida discrta, isto é direito dele e também não é da conta de ninguém.


Maurício Gays em campanha Para Prefeito, vote Maurício Gays Para Prefeito, vote Maurício Gays

Maurício Gays ao normal


Segundo as fofocas que correm por aí, Maurício Gays está de caso novo. As amiguinhas dele na comunidade acham o bofe lindo e ele está até dando ciúme entre elas. Depois que o MG (Maurício Gays) mandou um recadinho para que todos comprassem biscoitinhos de maizena do rapaz, aí a inveja cresceu muito e inveja quando não mata, aleija, faz a pessoa ficar má, cruel. Foi com esta inveja curtida e azedada que uma amiguinha da comunidade me mandou a foto da dupla Ratinho e Xaropinho. (Liga não, boba, é só inveja roxa).


Para Prefeito, vote Maurício Gays

Maurício, venha para o nosso reduto para receber nosso abrigo e carinho. Não liga para nossas coleguinhas invejosas.


Para Prefeito, vote Maurício GaysTô bege com este bofe!

 
Read more...

from Right to privacy

Tor browser logoLogo of The Tor Project, Inc.

A web browser is a piece of software that one can use for loading web pages on their mobile or computer. We have popular browsers like Firefox, Chrome and Safari. These web browsers are the breeding grounds for trackers and offer little to no privacy. Tor browser solves these problems and offers a good mix of usability and privacy.

How is Tor browser different?

Tor browser is named after the overlay network called The Onion Router (TOR). An overlay network is like a network on top of a network. This overlay network encrypts and structures the network request like layers of an onion. Three layers. First layer knows about your identity but does not have access to your request. Second layer neither knows you nor your request. Third layer knows about the request, but not about the requester. Tor browser passes your network traffic through this overlay network and strips your identity from the data you are requesting. This means that server will not know about your identity, which most browsers don’t hide. If used properly, it can be used to become anonymous on the internet.

Why use Tor browser?

Privacy! For privacy! In case you feel you don't need privacy because you have nothing to hide, well you will find here that nothing to hide is just a propaganda. Everyone has something to hide. After all, don't we have curtains in our rooms? Don't we put screen lock on our phone? Why?

If you still feel you have nothing to hide. Well stop reading and email me all your social media credentials. Let's make sure you have nothing to hide.

“Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.”

~Edward Snowden

Some rules while using the Tor browser

I realize you despise rules, but there are numerous scenarios where using Tor incorrectly may get you in trouble:

  1. Avoid changing settings of the browser.
  2. Don't install extensions.
  3. Don't change the window size of the browser.
  4. Avoid use of VPN in combination with Tor.
  5. Don't use torrents.
  6. Avoid online payments.
  7. Avoid sharing personal information (You should do that on normal browsers as well).
  8. Make sure the website you are visiting is https.
  9. Keep the browser up to date.

At first glance, these rules may not make sense. First three points are necessary to keep yourself anonymous on the network. How does changing settings or installing extensions on Tor browser effect anonymity? To understand this, consider Tor browser to be a taxi and the internet like a road. If your taxi looks like just any other taxi on the road, it is very hard for an onlooker (trackers) to tell in which taxi you are present. The onlooker can go taxi by taxi to search for you, but it will be no simple job. In contrast to this, say you customized your taxi and painted it in red. Immediately, the onlooker will find you.

A large queue of similar looking taxisPhoto from Unsplash

To know more about how software and anonymity works. Read this paper.

Point number four and five are very important before you use Tor. VPN with Tor adds an unnecessary layer before or after the traffic goes through Tor. This can lead to VPN recording all your requests, which may compromise your privacy. Only use VPN if you know what you are doing. Using torrents with Tor exposes your location and is an “attack me” signal to all hackers. This blog by the Tor Project explains in detail about the scenario.

In most cases, online payment platforms request you to share personal information to process the transaction. Platforms also often prevent transactions taking place from the Tor network. You may need Tor for currencies like bitcoin, ethereum, et cetera. You should avoid sharing personal information because you were using it for anonymity and privacy. It is like getting out of the taxi and screaming, “It’s me! It’s me!”

I would also recommend you to read the detailed FAQ of the Tor Project for more information.

How to setup Tor browser?

How to download?

Tor Browser can be downloaded for most operating systems from here. If you are using iOS, you can search for Onion Browser on the Apple app store.

How to use?

Using Tor browser is straightforward:

Linux, Windows & Mac
  1. Launch the application.
  2. Well, Start browsing!
Android
  1. Launch the application.
  2. If you are on Android, you will see a Connect button. Tap the button and it will establish the connection.
  3. Well, Start browsing!
iOS
  1. Launch the application.
  2. If you are on iOS, you will see Connect to tor button. Then it will ask you about the security setting, choose Gold and click on Start browsing button.
  3. Well, Start browsing!

When to use it?

You don't have to use it always. It is just for those occasions when you want do something that you won't tell anyone. Not because it is illegal but because it is personal.


This blog would not be possible without open source projects like PrivacyTools who bring this blog online and WriteFreely, the developers of this blogging platform. Please consider donating to these platforms that empower people to voice their opinion.

 
Read more...

from Shepaconoid PL

Lista aktualnych bezpiecznych komunikatorów: Signal – najprostszy w użyciu, bardzo podobny do whatsapp'a. Szyfruje nie tylko treść ale i też metadane oraz ma narzędzie do blurowania twarzy.

Briar – działa nawet bez internetu. Szyfruje dane i przepuszcza je przez sieć TOR. Ma funkcje tworzenia blogów i forum.

Theerema – płatny, bezpieczny komunikator.

TOX – podobny do skype ale szyfrowany. Dobra alternatywa do skype'a lub zoom'a.

 
Czytaj dalej...