mojo,

A hammer

Also these are privacy apps, not cyber security

wookiepedia,

nmap

SkybreakerEngineer,

My favorite cybersecurity tool is the clue-by-four. I apply it directly to Layer 8 problems.

Enkrod,

I see you know how to deal with ID-10t errors.

thesmokingman,

I’m not really seeing much in the way of cybersecurity tools in this thread. These are all FOSS and usable without extra cost (although some have paid upgrades)

mqvisionary,

Joplin, a note taking app… and is that obsidian icon under it? The picture is so dumb.

kugiyasan,

Why is Obsidian on the list?? How is a closed source electron app for editing markdown files a good cybersecurity tool/privacy respecting? I could use nano to do the same job with much more confidence for my privacy.

thesmokingman,

I’m not sure I follow the closed source bit. For example, Virus Total is closed source but a something used by cybersecurity professionals across the world. Most of the software that powers cloud giants is closed source and security professionals everywhere accept the shared security model.

Closed source matters for encryption, not necessarily tooling. It’s a red herring unless you’re talking about a tool’s ability to encrypt/decrypt.

online,

Tbh I don’t think that’s a list. I think that’s just their website’s graphic banner thing and they slapped it on.

chemicalwonka,
@chemicalwonka@discuss.tchncs.de avatar

Brave is far from being a cybersecurity tool

My favorites tools in this image is Aegis and Signal

Zoidberg,

I have to say my faith in signal has been shattered since I got crosstalk on a signal conversation. I still can’t imagine how that’s possible but it was there, clear as day.

chemicalwonka,
@chemicalwonka@discuss.tchncs.de avatar

Explain more I didn’t undestand you.

kadotux,

Please elaborate?

sic_semper_tyrannis,

Ublock Origin as ads have lots of malware these days and browsing the internet is a normal occurance. I think looking at it that way it gets used far more than any other tool.

akilou,

I use Firefox, Proton everything, Signal (for the 4 contacts who have it). I guess that’s it.

I try to use Plex as much as possible instead of streaming services…?

Vexz, (edited )

Sadly Plex collects some data about its users. I remember opting out of some telemetry stuff but I can't remember where that was. If you want a self-hosted streaming service like Plex that completely respects your privacy, Jellyfin is what you're looking for. I tried it and it's okay but not as good as Plex imo. But if your main focus is privacy then you should definitely check it out. It's FOSS.

Edit:
I found where I had to opt out some data collection for Plex. Open this site, scroll halfway down the page. You'lle see two checkboxes for "Send playback data to Plex" and "Advertising Consent".

akilou,

Yeah I tried Jellyfin too but Plex is much better. I just threw it in the list because I figured it was better than having a bunch of video and music streaming services.

Mandy,

that seems like a pretty random selection of things honestly, what qualifies as a cybersecurity tool? hows vivaldi a part of that? or openotp?

sir_reginald,
@sir_reginald@lemmy.world avatar

half of these are not even barely security related.

and if you meant privacy, well, definitely none of the images either. SimpleX, SearXNG, Tor and I2P

PS: I find it hilarious that you include proprietary software like Vivaldi or Obsidian. That is how flawed this post is.

hellfire103,
@hellfire103@sopuli.xyz avatar

I have a page on my Gemini capsule with a list of the software I use. Ask away about my reasons for any of the entries.

Gemini | HTTPS

I also quite like LUKS, VeraCrypt, and geli(8) for disk encryption, and I use mainly physical media (e.g. CDs) for music and video.

sumikko,

ffuf, hashcat, burpsuite and linpeas

Onii-Chan,
@Onii-Chan@kbin.social avatar

GrapheneOS, Signal, Vanadium, Mullvad VPN, extremely strict permissions. I don't do much with my phone, but I still need to know I'm in control of my privacy.

Norgur,

my favourite "Cyber-Security-Tool"? None of those logos up there qualify for that descrption... well... Authy perhaps...
yet, my favourite "Cyber-Security-Tools" would be
Configs:

environment:

  • PUID=110XX
  • PGID=110XX
  • UMASK=002

PasswordAuthentication no
PermitRootLogin no

Software:

  • Restic
  • Bitwarden
  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacyguides@lemmy.one
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #