- Do not trust anything to be absolutely secure.
- Do not trust anything to be secure based on it being advertised as secure.
- Avoid Intel processors because Intel Management Engine (IME) is not trusted.
- Avoid closed-source operating systems, like Microsoft Windows, etc.
- Do not prefer closely-compiled open-source operating systems.
- Do not prefer closed-source drivers, system components, keyboards, package managers, application stores, or applications, etc.
- Try HeliBoard open-source keyboard on Android.
- Try LibreWolf, Mozilla Firefox, Fennec F-Droid, Mull, or Ungoogled Chromium open-source web browsers.
- Try K-9 Mail open-source email client.
- Try KeePassXC, KeePassDX open-source password managers.
- Try LibreOffice open-source office suite.
- Try Aurora Store as an alternative frontend to Google Play Store.
- Prefer open-source application stores, like F-Droid, Fossdroid, etc. on Android.
- Avoid storing installer files or copying them from others by any means.
- Avoid untrusted activators for OS or applications, like KMSPico, etc.
- Avoid cracked or pirated OS or applications.
- Do not prefer those Android applications that are reported by Exodus Privacy to be known to have tracker SDK(s).
- Use uBlock Origin extension on web browsers. Try enabling the desired filter lists.
- Mozilla Firefox based browsers: Mozilla Add-ons
- Chromium based browsers: Chrome Web Store
- Use Decentraleyes extension on web browsers to block tracking via CDNs (Content Delivery Networks).
- Mozilla Firefox based browsers: Mozilla Add-ons
- Chromium based browsers: Chrome Web Store
- Use OpenPGP email encryption.
- Calculate and match hash (MD5, SHA256, SHA512, etc.) values of files after file transfers.
- You can try my open-source application, Bitscoper Cyber ToolBox.
- Microsoft Store: https://apps.microsoft.com/detail/9n6r5lxczxl6
- Google Play Store: https://play.google.com/store/apps/details?id=bitscoper.bitscoper_cyber_toolbox
- You can try my open-source application, Bitscoper Cyber ToolBox.
- Use virtual machines for isolation purposes.
- Try OnionShare to chat, share files, and serve static websites over TOR.
- Try a VPN when using TOR to hide the TOR transmissions.
- Try using separate email addresses and mobile numbers for communication and account’s security.
- Do not trust the SMS verification method blindly. Prefer TOTP (RFC 6238) instead.
- Some VPNs, like Mullvad VPN and Calyx VPN, have good names.
- Host your own NextCloud instance for collaboration.
Take a look: