Resources

Discover Cool Resources

Explore my favourite resources, tools and applications. Learn how they can benefit you.

Discover Cool Resources: Explore Privacy-Focused Operating Systems, Tools & Services


Privacy-Focused Linux Distributions

Pop!_OS with COSMIC Desktop

Pop!_OS has emerged as one of the most exciting Linux distributions in 2026, particularly with its revolutionary COSMIC desktop environment. Developed by System76, this Ubuntu-based distribution features a custom desktop environment entirely written in Rust that delivers exceptional performance and a modern computing experience.

The COSMIC desktop offers blazingly fast performance with a highly configurable interface that works perfectly out-of-the-box. Its tiling window management allows you to quickly and conveniently position apps alongside one another to maximize screen real estate productivity. The distribution excels in hardware support, especially for NVIDIA and AMD graphics cards, making it an excellent choice for gaming PCs and creative workflows.

Users should consider Pop!_OS if they want a modern, responsive desktop experience without sacrificing stability. The COSMIC Store separates system updates from Flatpaks seamlessly, and the distribution is particularly well-suited for developers and gamers who need excellent hardware integration^5,8. POP_OS! encrypts its installation by default, without help from third-party tools, enhancing your privacy by securing the partition it operates within.

Kali Linux

Kali Linux remains the premier choice for cybersecurity professionals and penetration testers in 2026. Originally released in 2013 (previously known as BackTrack), Kali is developed by Offensive Security and specializes in digital forensics and security testing.

Its extensive collection of pre-installed security tools makes it an ideal platform for analyzing systems, testing networks, and identifying vulnerabilities. The distribution maintains regular updates and includes specialized tools for wireless attacks, reverse engineering, and forensics that would require significant manual installation on other distributions.

Security professionals should consider Kali Linux for its comprehensive toolset, active community support, and regular updates that ensure access to the latest security testing methodologies. The distribution’s focus on security testing makes it the standard for ethical hacking and cybersecurity education.

ParrotOS

ParrotOS continues to be a favorite among security professionals and IT administrators who need a lightweight yet powerful security-focused distribution. Developed by a community of enthusiasts, ParrotOS offers a user-friendly interface while providing access to advanced security tools like Wireshark and Nmap.

Applications that run on Parrot OS are fully sandboxed and protected, making it fast, lightweight, and compatible with most devices. The distribution is particularly well-suited for monitoring network traffic, analyzing logs, and identifying potential threats in enterprise environments.

Users should consider ParrotOS if they need security tools but prefer a more lightweight system than Kali Linux. Its focus on privacy and security features makes it excellent for both penetration testing and everyday secure computing.

Manjaro

Manjaro remains a popular choice for users seeking flexibility and customization in their Linux experience. Developed by the Manjaro Community, this Arch-based distribution offers a rolling-release model that ensures users always have access to the latest software updates.

Manjaro’s strength lies in its balance between cutting-edge software and stability. It provides access to the Arch User Repository (AUR) while maintaining user-friendly installation processes and system management tools. With multiple desktop environment options and a strong focus on community involvement, Manjaro appeals to both beginners and experienced Linux users.

Users should consider Manjaro if they want access to the latest software without the complexity of a pure Arch installation. Its wide range of available repositories and excellent hardware detection make it a versatile choice for various computing needs.

BlackArch

BlackArch is an extensive penetration testing distribution that provides users with access to a massive repository of security tools. Based on Arch Linux, BlackArch offers over 2800 specialized tools for information security assessment and penetration testing.

What distinguishes BlackArch is its comprehensive toolset that covers everything from reconnaissance to exploitation and post-exploitation activities. The distribution can be installed as a standalone operating system or used as a repository on existing Arch Linux installations, providing flexibility for security professionals.

Whonix

Whonix is a privacy-focused operating system designed for maximum anonymity through advanced security architecture. It separates internet-facing and local activity between two virtual machines—Gateway (Tor) and Workstation—ensuring maximum anonymity.

Whonix focuses on privacy, security, and anonymity, aiming to realistically address common attack vectors and possibly protecting users from zero-day vulnerability exploitation^10. Its unique architecture prevents IP address leaks and DNS leaks by design, making it one of the most secure options for anonymous computing.

Users should consider Whonix if they need robust protection against surveillance and tracking. Its compartmentalized design makes it ideal for journalists, activists, and anyone handling sensitive information who requires strong anonymity protections.

Tails

Tails (The Amnesic Incognito Live System) is a security-focused operating system designed to leave no trace on the computer it’s running on. Tails excels at providing privacy, with a security model heavily reliant on its amnesic nature and the Tor network.

The distribution ships with tools like Tor Browser, HTTPS Everywhere, and encrypted messaging apps pre-installed. Its amnesic design ensures that all data is wiped upon shutdown, preventing any forensic recovery of user activity.

Users should consider Tails if they need a portable solution for anonymous computing sessions. Its focus on privacy and leaving no digital footprint makes it ideal for journalists, activists, and anyone who needs to use computers on potentially compromised networks.

Kodachi

Kodachi is a privacy-focused Linux distribution that provides extensive security features out-of-the-box. The distro uses AppArmor for application isolation and includes an entire suite of privacy-protection tools.

Kodachi comes pre-installed with tools like VeraCrypt, zuluCrypt, KeePassXC, Metadata Anonymization Toolkit (MAT) for zapping metadata information from files, and more. This comprehensive approach to privacy makes it suitable for users who want maximum protection without configuring multiple security tools individually.

Users should consider Kodachi if they want a distribution with extensive privacy tools pre-configured. Its focus on providing a secure environment without requiring extensive technical knowledge makes it accessible to users who prioritize privacy but may not have advanced technical skills.



Privacy-Focused Mobile Operating Systems

LineageOS

LineageOS continues to be the leading privacy-focused alternative to mainstream mobile operating systems. As a successor to CyanogenMod, LineageOS provides an open-source Android-based experience without the proprietary modifications and data collection practices of commercial vendors.

The distribution offers enhanced privacy controls, longer device support lifecycles, and regular security updates. Users benefit from granular permission management and the ability to customize their experience without manufacturer-imposed limitations.

Users should consider LineageOS if they want an Android experience with improved privacy and longer device support. Its active development community ensures compatibility with a wide range of devices while its open-source nature provides transparency about system operations.

IODE OS

IODE OS represents a new approach to mobile operating systems with its focus on privacy and security. Designed for smartphones and mobile devices, IODE OS provides a secure alternative to mainstream mobile operating systems while maintaining compatibility with Android applications.

The distribution emphasizes user privacy through enhanced encryption, minimal data collection, and granular permission controls. Its lightweight design ensures good performance even on older hardware, making it accessible to users with various device capabilities.

Privacy-conscious mobile users should consider IODE OS if they want greater control over their data without sacrificing app compatibility. Its focus on security features makes it an excellent choice for users concerned about mobile surveillance and data tracking.

GrapheneOS

GrapheneOS remains the gold standard for mobile security and privacy in 2026. This security and privacy-focused Android OS is designed from the ground up to protect against exploitation and data collection while maintaining app compatibility.

GrapheneOS hardens Android with advanced memory protection, secure app sandboxing, and zero tracking, making it ideal for mobile privacy. The distribution also provides verified boot processes and regular security updates that often precede official patches.

Security-conscious users should consider GrapheneOS if they need the highest level of mobile protection available. Its focus on preventing exploitation makes it ideal for journalists, activists, and anyone handling sensitive information on mobile devices.

Sailfish OS

Sailfish OS offers a unique alternative to Android-based systems with its secure mobile operating system built on Linux. Developed by Jolla, Sailfish provides a distinct user experience with strong privacy protections and efficient resource usage.

The system features gesture-based navigation, true multitasking capabilities, and compatibility with selected Android applications through its Alien Dalvik runtime. Its security model includes proper permission management and sandboxing of applications.

Users seeking an alternative to Android should consider Sailfish OS if they value privacy and want a distinctive mobile experience. Its efficient design makes it suitable for devices with limited resources while its security features provide protection against common mobile threats.

Nethunter

Kali NetHunter extends Kali Linux’s capabilities to mobile devices, providing a comprehensive platform for mobile penetration testing and security assessments. Developed by Offensive Security, NetHunter transforms Android devices into powerful security testing tools.

The distribution includes a custom kernel that supports various wireless injection modes, USB HID attacks, and specialized networking capabilities. It provides access to the full Kali toolset adapted for mobile use, along with specialized features like HID keyboard attacks and MANA Evil Access Point attacks.

Security professionals should consider NetHunter if they need to conduct security assessments on the go. Its ability to run on a wide range of Android devices makes it a versatile tool for mobile penetration testing and network security evaluations.



Essential Privacy Tools

Password Managers

KeePassXC

KeePassXC is a cross-platform password manager that provides secure storage for sensitive credentials. As an open-source solution, it offers transparency and community auditing while maintaining strong encryption standards.

KeePassXC features encrypted database storage, password generation, form filling, and secure note storage. It supports various authentication methods including key files and hardware security modules for additional protection.

Users should consider KeePassXC if they prefer a locally stored password database that doesn’t rely on cloud services. Its cross-platform compatibility and strong encryption make it suitable for users who want complete control over their password storage.

Bitwarden

Bitwarden offers a comprehensive password management solution with both free and premium tiers. As an open-source platform, it provides transparency while offering cloud synchronization across devices.

Bitwarden features end-to-end encryption, password generation, secure note storage, and form filling. It also supports organization features for teams and families, making it versatile for both personal and professional use.

Users should consider Bitwarden if they need cross-device synchronization without sacrificing security. Its generous free tier and open-source nature make it accessible to users who want a reliable password manager without subscription fees.



Privacy-Focused Browsers

Brave

Brave is a privacy-focused web browser that blocks trackers and advertisements by default. Built on Chromium, it maintains compatibility with most websites while providing enhanced privacy protections.

Brave features automatic blocking of ads and trackers, built-in Tor access, and script blocking capabilities. It also offers a privacy-respecting rewards system that allows users to earn cryptocurrency for viewing privacy-respecting ads.

Users should consider Brave if they want a browser that protects privacy without requiring extensive configuration. Its balance of privacy features and compatibility makes it suitable for users transitioning from mainstream browsers.

LibreWolf

LibreWolf is a privacy-focused fork of Firefox designed to minimize data collection and enhance security. It maintains Firefox’s compatibility while implementing stricter privacy settings by default.

LibreWolf features enhanced tracking protection, uBlock Origin integration, and privacy-respecting search engine settings. It also removes telemetry and implements additional security hardening beyond Firefox’s standard configuration.

Users should consider LibreWolf if they prefer Firefox’s ecosystem but want stronger privacy protections out-of-the-box. Its focus on preventing fingerprinting and tracking makes it suitable for privacy-conscious users who value open-source solutions.

Firefox

Firefox continues to be a leading privacy-focused browser from the non-profit Mozilla Foundation. Its open-source nature and extensive customization options make it a favorite among privacy advocates.

Firefox features Enhanced Tracking Protection, container tabs for isolating website activities, and extensive extension support. Recent versions have improved resource efficiency while maintaining strong privacy protections.

Users should consider Firefox if they want a customizable browser with strong privacy protections and extensive extension support. Its balance of features, performance, and privacy makes it suitable for most users who value control over their browsing experience.

Mullvad Browser

Mullvad Browser is a privacy-focused browser developed in collaboration between Mullvad VPN and the Tor Project. It’s designed to minimize fingerprinting and tracking while maintaining usability.

Mullvad Browser features anti-fingerprinting technology, reduced network fingerprinting, and privacy-respecting defaults. It’s designed to work optimally with VPN services while providing strong protection against tracking.

Users should consider Mullvad Browser if they want maximum protection against fingerprinting and tracking. Its focus on making all users appear identical to trackers makes it suitable for users who need strong anonymity protections.



VPN Services

Proton VPN

Proton VPN is a privacy-focused VPN service developed by the team behind ProtonMail. Based in Switzerland, it benefits from strong privacy laws and a commitment to user privacy.

Proton VPN features AES-256 encryption, a strict no-logs policy, secure core servers that route traffic through privacy-friendly countries, and built-in Tor access. It also offers split tunneling and kill switch protection.

Users should consider Proton VPN if they want a VPN service with a strong commitment to privacy and security. Its jurisdiction in Switzerland and transparency reports make it suitable for users who need reliable privacy protections.

Nym

Nym represents a next-generation approach to online privacy through its mixnet technology. It goes beyond traditional VPN services by providing protection against even sophisticated surveillance systems.

Nym features a three-layer mix network that breaks metadata correlation, Sphinx packet routing for anonymity, and credentials that provide privacy-preserving authentication. It’s designed to protect against traffic analysis and surveillance.

Users should consider Nym if they need protection against advanced surveillance techniques. Its focus on preventing metadata correlation makes it suitable for users who face sophisticated adversaries or require maximum anonymity.

Mullvad VPN

Mullvad VPN is a privacy-focused VPN service known for its strong commitment to user anonymity and security. Based in Sweden, it maintains a strict no-logs policy and accepts anonymous payment methods.

Mullvad VPN features WireGuard and OpenVPN protocols, IPv6 leak protection, and kill switch functionality. It also offers port forwarding and supports multiple simultaneous connections.

Users should consider Mullvad VPN if they want a no-frills VPN service with a strong focus on privacy. Its anonymous account system and commitment to privacy make it suitable for users who prioritize anonymity above all else.

DeeperConnect

DeeperConnect offers a decentralized VPN solution that combines hardware and software for enhanced privacy. It provides both VPN functionality and blockchain-based security features.

DeeperConnect features decentralized network routing, ad blocking, and parental controls. Its hardware solution provides plug-and-play functionality while maintaining strong encryption standards.

Users should consider DeeperConnect if they want a hardware-based VPN solution with additional security features. Its decentralized approach makes it suitable for users who want to avoid centralized VPN providers.

IVPN

IVPN is a privacy-focused VPN service known for its strong security features and transparent business practices. Based in Gibraltar, it maintains a strict no-logs policy and offers multi-hop connections.

IVPN features WireGuard and OpenVPN protocols, anti-tracking measures, and multi-hop connections through multiple servers. It also offers a kill switch and split tunneling functionality.

Users should consider IVPN if they want a VPN service with advanced security features and transparent practices. Its focus on privacy and security makes it suitable for users who need reliable protection for sensitive activities.

Secure Email Services

Mailfence

Mailfence is a secure email service that offers end-to-end encryption and digital signing. Based in Belgium, it operates under European privacy regulations and provides a comprehensive suite of productivity tools.

Mailfence features OpenPGP encryption, digital signatures, and secure calendar and document collaboration tools. It also offers two-factor authentication and encrypted contacts management.

Users should consider Mailfence if they want a secure email service with integrated productivity tools. Its focus on encryption and privacy makes it suitable for professionals and privacy-conscious individuals.

Tutanota

Tutanota is a secure email service with a focus on end-to-end encryption and privacy. Based in Germany, it operates under strict European privacy laws and offers automatic encryption for all emails.

Tutanota features end-to-end encryption for emails and contacts, encrypted calendar functionality, and two-factor authentication. It also provides a secure password recovery system and anonymous account options.

Users should consider Tutanota if they want an email service with automatic encryption and strong privacy protections. Its focus on security and usability makes it suitable for users who want encryption without complex configuration.

ProtonMail

ProtonMail is a secure email service developed by the team behind Proton VPN. Based in Switzerland, it benefits from strong privacy laws and a commitment to user privacy.

ProtonMail features end-to-end encryption, zero-access encryption, and self-destructing emails. It also offers encrypted contacts and calendar functionality with two-factor authentication.

Users should consider ProtonMail if they want a well-established secure email service with a strong reputation for privacy. Its focus on security and usability makes it suitable for users who need reliable encrypted communications.

Why Privacy Matters in Our Digital Age

In today’s increasingly connected world, privacy has become a fundamental human right rather than a luxury. The digital landscape of 2026 resembles something Orwellian in nature, with surveillance capabilities that would have seemed like science fiction just decades ago. Our every action online is tracked, logged, and analyzed by corporations, governments, and data brokers who profit from our personal information.

Privacy is not just about hiding wrongdoing; it’s about maintaining autonomy over our personal lives. When we lose privacy, we lose the ability to form opinions without fear of judgment, to explore ideas without surveillance, and to control our personal narratives. In an era where data breaches are commonplace and surveillance technologies are increasingly sophisticated, protecting our privacy has become essential for maintaining our freedom and dignity.

For cybersecurity professionals, privacy is a technical challenge to be addressed through encryption, anonymization, and secure systems. But for everyone else, privacy is about preserving our humanity in a digital world that constantly seeks to reduce us to data points. It’s about maintaining the ability to be ourselves without constant observation, to make mistakes without permanent records, and to live without the chilling effect of surveillance.

The tools and services listed above provide practical means to reclaim some of this privacy. Whether through secure operating systems that protect against surveillance, password managers that safeguard our digital identities, or communication services that encrypt our conversations, each tool represents a step toward preserving our autonomy in an increasingly monitored world.

By adopting these privacy-enhancing technologies, we not only protect ourselves but also contribute to a culture that values privacy. In a world where our data is constantly being harvested for profit and control, choosing privacy is an act of resistance—a declaration that our personal lives are not commodities to be bought and sold.