Deflect - DDoS protection and web security

Herramientas
Resources to Support Users in Russia and Ukraine — Localization Lab
Línea de Ayuda en Seguridad Digital - Access Now
Firefox Relay
Issues | Jigsaw
Pleroma - Finding the Good Instances, part 1
Top CLAX - Getting Started With Scribus - InDesign alternative
GitHub - soxoj/maigret: 🕵️♂️ Collect a dossier on a person by username from thousands of sites
Codeberg.org
Homoglyph Homographs Generator - Online Writing
GitHub - Shawn-Shan/fawkes: Fawkes, privacy preserving tool against facial recognition systems. Obfuscate/Cloak your face
GitHub - AppImage/awesome-appimage: Lovingly crafted AppImage tools and resources
Set up DNS 1.1.1.1 on a router · Cloudflare 1.1.1.1 docs
POSSE - IndieWeb
GitHub - vulhub/vulhub: Pre-Built Vulnerable Environments Based on Docker-Compose
Fail2ban (Español) - ArchWiki
Instalar configurar y usar fail2ban para evitar ataques de fuerza bruta
UFW Essentials: Common Firewall Rules and Commands
Iptables Essentials: Common Firewall Rules and Commands
GitHub - AndyFul/ConfigureDefender: Utility for configuring Windows 10 built-in Defender antivirus settings.
Harden Windows Defender protection to the highest levels on Windows 11/10
The 3 Biggest Security Mistakes Linux Users Make
Router Security
Hardening SSH
Mpv – A free, open source, and cross-platform media player (mpv.io)
Prose.sh – A blog platform for hackers (prose.sh)
GitJournal: Mobile first Markdown notes synchronized with Git (gitjournal.io)
Detecting unauthorized physical access with beans, lentils and colored rice (dys2p.com)
revealed in 2014 in the book "Global Surveillance" by Glenn Greenwald that the NSA's "TAO" (Tailored Access Operations) unit has been intercepting and tampering with technical devices in transit since at least 2010.
The relevant factor in this process is the amount of elements on the edge of the sticker. In addition, there are special seal stickers available which break when peeled off. They are probably more suitable for this method.
Glitter nail polish directly
This method is used by Nitrokey, Purism and others, and is safer compared to the previous method in our view. The screws are sealed directly with glitter nail polish. The screws holes are particularly relevant here.
Our favorite so far is sealing screws with epoxy resin and glitter nail polish, where the polish can be in or over the resin.
random mosaic $ rm -r ice
An alternative to sealing is embedding the whole object in a substance whose surface forms a mosaic that is difficult to reproduce and changes when manipulated. It should be as easy as possible to check the mosaic manually or by technical means. The goal is to protect written documents, data carriers, communication devices, hardware wallets and other sensitive objects in such a way that unauthorized access can be detected with greater probability. We distinguish between two use cases: short-term storage and longer-term storage or shipping.
Tailscale SSH (tailscale.com)
RethinkDNS | Fast, secure, configurable, private DNS + Firewall for Android.