top of page

Some considerations for life in a digital environment 


There is no single solution for keeping yourself safe online. Digital security isn’t about which tools you use; rather, it’s about understanding the threats you face and how you can counter those threats. To become more secure, you must determine what you need to protect, and whom you need to protect it from. Threats can change depending on where you’re located, what you’re doing, and whom you’re working with. Therefore, in order to determine what solutions will be best for you, you should conduct a threat modeling assessment.


How to: Delete Your Data Securely on Windows

Download location:

Computer requirements: Windows XP or higher

Versions used in this guide: BleachBit 1.6

License: GPL

Level: Beginner

Time required: 10 minutes to several hours (depending on size of files/disks to be securely deleted)

Please check the documentation for further information.


Likewise, it is almost impossible to securely delete an individual file on an SSD, because the way that SSDs write and delete files is scattered, and a user has no control over what an SSD is doing where. If that's the kind of security you're looking for, your best bet is encryption, which we will cover in a little bit.


The most popular option for protecting data, absent of robust secure erasing tools that scrub right down into the over-provisioned cracks, is to encrypt the SSD's contents. This way, if someone's coming after your data, the only thing you need to make sure is off the drive is the security key (128- or 256-bit AES is recommended) and your bits will be safe, unless whoever wants your data is up to cracking that code.


And finally, lest we forget, there are many more violent options if you don't intend to reuse the drive. Pulverization and pyrotechnics are both quite reliable.



You are being tracked.

Whatever you do online, you leave digital tracks behind.

These digital footprints are used to market to you - and to influence your thinking and behavior.

Introducing Noiszy
Noiszy is a browser plugin that creates meaningless web data - digital "noise."

Oct 20th Privacy, IP Check, Browser Leaks

This IP check is a free and easy understandable anonymity test. The test shows which attacks a website may launch on your privacy. Plus you get recommendations for possible counter measures. It explains which data your own web browser sends to websites. A website may use this data to create an individual profile. By misusing such a profile, you may later get identified reliably on this or on another website.


Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

Jan 26th 2016 - Tor, Live Operating System

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.

October 30th - Privicay 

The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows.

Please reload

Fingerprinting your Web Browser

© 2015 Fuck Copyrights!!!! Public Domain, GNU, Freeware, OpenSource, Just steal it

bottom of page