The latest Edward Snowden leaks have shown that the oldest, least funded open-source technologies are still able to hold out against intrusions and exploits by the U.S. National Security Agency (NSA).
Open-source offers one major benefit over their closed-source counterparts: The code is public and available for inspection, and therefore can’t as easily include secret backdoors for surveillance.
Here are some of those (as of yet) still secure apps, services, and technologies that can keep you safe online.
Tor, otherwise known as the “onion router,” is one of the most popular -- and undefeated -- ways to browse the Internet without leaving your activity open for prying eyes.
Tor’s network of bouncing your traffic through multiple relays makes it nearly impossible to track a user’s identity or activity. You can access almost every website anonymously, including “.onion” addresses, which are only accessible while connected to Tor.
Since the Snowden documents first landed, Tor usage has shot up. That’s spurred on by the fact that leaks have shown how troubled the agency is still unable to crack the network.
Visit: Tor Project
Mitro is a lightweight browser-based password manager that logs you in to your various websites automatically. It's also open-source, making it more difficult to include backdoors and flaws.
Password managers don't just take the pain out of remembering the dozens of passwords in your life, but they protect your logins and identities by storing your various sets of credentials. No longer is it necessary to remember them, or have them written down in an insecure way. Ultimately, a password manager that’s known, and tried and tested can suffice.
Mitro, which comes with a glowing recommendation from the Electronic Frontier Foundation privacy group, and works on a number of popular browsers, including Chrome, Firefox, and Safari.
Perhaps one of the biggest thorns in the side of the intelligence community: uncrackable email.
PGP, or “Pretty Good Privacy,” first released in 1991, remains the favorite tool of tens of millions of users worldwide, thanks to its apparently uncrackable encryption. It was never particularly user friendly, though. The modern incarnation lives on as an easier-to-use software called GPG, or the Gnu Privacy Guard, which is available for Windows, Mac, Linux, and other machines.
Although PGP now lives on with Symantec, GPG is open-source, and tried and tested by the security community. It is by far the one and only trusted secure encrypted email system. One of the benefits is that it works with your existing email address.
Visit: Gnu Privacy Guard
You can't just drag a file into the trash and think it's gone forever. Most of the time, files can be "undeleted." File shredders, however, are designed to securely remove important and sensitive data from your computer for good. Eraser is one of the most highly rated file shredders available, and, thanks to it being open-source, it's free to use.
Ghostery is a tracking tool that can be added to your browser to show you how you're being tracked online -- and by whom. Available for most modern browsers for desktop and mobile, its aim is to inform users of how many companies are tracking your activities, like what sites you visit, and which companies collect data on you in order to serve you adverts. It also (at the time of writing) blocks just shy of 1,980 trackers.
As an ad-blocker, AdBlock Plus is not strictly a privacy-saving software. But by blocking ads, the browser plug-in can significantly reduce the number of tracking cookies that get installed on your computer. The software, available for most widely used modern browsers, is used by more than 50 million people. It’s also open-source, so other developers can inspect the code.
Visit: AdBlock Plus
Hotspot Shield comes with virtual-private networking technology, allowing its users to bypass Internet provider or governmental restrictions. Many will also know it as a way of masking your country's IP address allowing you access to streaming services from other regions. But its primary goal is to allow users to securely browse the Web with end-to-end encryption in public places, which can often be prime targets for hackers and identity thieves.
Visit: Hotspot Shield
The little-known Linux-based operating system, Tails OS, rose to fame when it was given a glowing review in a name-check by whistleblower Edward Snowden.
Tails is slated as an all-in-one solution for those who want an operating system that leaves no trace behind, as it runs from a read-only USB drive or DVD. It comes bundled with a number of technologies -- including many of those noted in this slideshow -- and state-of-the-art cryptographic tools for communication.
Visit: Tails OS/Boum.org
Forget OneDrive, iCloud, and Dropbox. They may all offer encrypted cloud storage, but they have the keys, and can be compelled to hand over your files to the government. But SpiderOak, a cloud storage provider, can't and won't, because its users are the ones with the encryption keys. Its entire service revolves around its customers' privacy. Not only is it secure and private, it offers much of the same functionality as the mainstream providers.
By switching your DNS settings, OpenDNS aims to make the internet safer and more reliable, while at the same time improving your internet speeds and connection's reliability. OpenDNS aims to offer malware and botnet protection, and Web filtering to home users. This can help prevent gaining access to sites that are honeypots for hackers, or might put users at risk. And best of all, it's free.
Started out as a university research project, Off-the-Record messaging has become one of the most useful (and secure) ways of sending instant messages without having to worry about covert surveillance.
The software is widely considered as one of, if not the best tools out there -- so much so, other encryption-based software have included the code as part of their own projects.
The open-source software plugs in to common instant messaging software, including Adium, Cryptocat, and Pidgin -- among others. It’s free, and open-source, and tried and tested by the community as one of the most trusted ways of chatting online.
Visit: Off-the-Record Messaging
Silent Circle, which last year canceled its upcoming encrypted email service as to avoid being forced to hand over data to the government, invented Silent Phone. The encrypted voice calling service works on existing cellular networks. It’s not free, but it’s low-cost and has been widely lauded by privacy experts alike.
The company also received more than $30 million in funding towards its Blackphone design, an all-inclusive mobile device that aims to be surveillance-proof.
Visit: Silent Circle
Created by the Tor Project and the Electronic Frontier Foundation (EFF), the HTTPS Everywhere plug-in aims to force your browser into loading the secure version of a site over a page that doesn’t contain a security certificate. This makes browsing more secure by encrypting everything from your computer to their server, and vice-versa.
The plug-in, designed for Chrome, Firefox, and Opera, is also available for Firefox for Android.
Google’s business model revolves around serving ads against the user. The better the data, the better the ads. The better the ads, the more money it makes.
But not all search engines are like that. DuckDuckGo, which was recently added to Apple’s iOS 8 software, does not store your data or send your search terms to other sites. Every user gets the same results. It’s the first privacy-conscious search engine of our time.