Privacy Tool Box

Digital Tools for Living Off the Surveillance Grid

DNS Leak Test

Fast test to see whether your DNS requests are going through your VPN or leaking to your ISP.

Whoer.net

Displays IP address, DNS, system info, anonymity score, and proxy detection.

Have I Been Pwned

Check if your email or phone number has been in a known data breach.

Am I Unique?

Compares your browser fingerprint against others to show how easily you can be tracked.

Security Headers

Checks if a site implements secure HTTP headers like CSP, HSTS, etc.

VirusTotal

Scan URLs or files with dozens of antivirus engines.

URLVoid

Checks website reputation across multiple threat intel sources.

Hybrid Analysis

Deep scanning and behavioral analysis of files and URLs in sandbox environments.

Blacklight

Reveals ads, third-party trackers, and session recorders used by websites.

Cover Your Tracks (EFF)

Tests how well your browser protects against tracking and fingerprinting.

BrowserLeaks

Extremely detailed browser fingerprinting and leak tests: DNS, WebRTC, canvas, etc.

EFF Dice Passphrase Generator

Generate secure, memorable passphrases using diceware methodology.

Key Length

View recommended cryptographic key sizes across common encryption algorithms.

IPLeak.net

Checks for exposed IP addresses, DNS leaks, WebRTC leaks, and geolocation info.

OpenSnitch

Interactive Linux application firewall that alerts you on outbound connections and logs network activity.

Browser Fingerprint Testers

Web tools like EFF’s Cover Your Tracks that reveal how unique your browser fingerprint is.

Email Leak Tests

Services like Have I Been Pwned that check if your email or phone number appears in known data breaches.

OSINT Scraping Tools

Toolkits (e.g., Photon, IntelTechniques) for uncovering publicly exposed personal data across multiple sources.

Pi-hole

Network-wide ad and tracker blocker using DNS sinkholing to block domains at the network level.

Exodus Privacy

Static analysis tool that scans Android apps for embedded trackers and permissions.

TrackerControl & NetGuard

Android firewall apps that monitor and block outgoing connections per app via a local VPN interface.

Mobile Verification Toolkit (MVT)

Command-line forensic toolkit to scan device backups for indicators of spyware like Pegasus.

SnoopSnitch

Android app for detecting IMSI catchers and mobile network attacks through radio signal analysis.

Nextcloud

Self-hosted cloud suite for file sync, calendars, contacts, and more under full user control.

CryptPad

Web-based office collaboration suite with end-to-end encryption for pads, spreadsheets, and kanban boards.

KeePassXC

Offline password manager storing credentials in an encrypted vault with support for key files and hardware tokens.

VeraCrypt

Open-source disk encryption software for creating encrypted containers or encrypting entire drives.

Mullvad VPN

Privacy-focused VPN service with anonymous account creation, no logs, and support for WireGuard and OpenVPN.

OnionShare

Tor-based tool for anonymous file sharing and ephemeral website hosting via .onion URLs.

Fediverse Apps

Decentralized social platforms (Mastodon, PixelFed, PeerTube) using ActivityPub for interoperable networking.

Tor Browser & Network

Free, open-source browser and overlay network that routes traffic through volunteer relays to anonymize your connection and bypass censorship.

Element (Matrix client)

Open-source client for the Matrix protocol offering end-to-end encrypted text, voice, and video chats.

Signal Private Messenger

Open-source, end-to-end encrypted messaging app for text, voice, and video calls with minimal metadata retention.

Jami

Peer-to-peer encrypted communication app using a distributed hash table instead of centralized servers.

Briar

Peer-to-peer encrypted messaging app that works without central servers, using Bluetooth, Wi-Fi, or Tor.

Monero

Privacy-centric cryptocurrency using ring signatures, stealth addresses, and confidential transactions for untraceable payments.

Session Messenger

Decentralized, metadata-minimizing messenger using a blockchain-backed network with anonymous IDs.

Hardware Privacy Gadgets

Physical tools like Faraday bags, USB data blockers, and camera/mic covers to prevent tracking and unauthorized access.

Tails OS

Live operating system that routes all traffic through Tor and leaves no trace on the host machine.

Qubes OS

Security-focused desktop OS using virtualization to compartmentalize tasks into isolated domains.

GrapheneOS

Privacy- and security-hardened mobile OS based on Android, fully de-Googled for Pixel devices.

LineageOS & CalyxOS

Community-driven Android replacements for de-Googling smartphones, with optional microG support.

Librem 5 & PinePhone

Privacy-focused smartphones with open hardware and physical kill switches for mic, camera, and baseband.

Content coming to this page soon….