This page contains security-related recommendations. Kindly note that we exclusively recommend hardware, software, and services that we use and own. We do not endorse any products based on sponsoring or things we only know from hearsay.
General information security topics
The following resources are useful to learn about InfoSec in general:
- McCarty: Cyberjutsu, ISBN 978-1-7185-0054-9
- Security Now (weekly podcast with Steve Gibson and Leo Laporte)
- StormCast (daily 5-10 minute podcast about current InfoSec topics)
- Darknet Diaries (bi-weekly podcast about “hacker” stories)
- Information Security Stack Exchange (Q&A website for information security professionals)
Other useful websites
- EFF Security Education Companion (for digital security educators)
- EFF Surveillance Self-Defense (tips, tools, and how-tos for more secure online communications)
- IT and Information Security Cheat Sheets (cheat sheets on numerous topics)
- OWASP Cheat Sheet Series (cheat sheets on multiple topics)
We recommend learning the basics of computer networking. Then, read our special Home network security.
- Introducing Basic Network Concepts (PDF file)
- Peterson/Davie: Computer Networks: A Systems Approach (free online access)
- Meyers: CompTIA Network+ Certification All-in-One Exam Guide (Exam N10-007), ISBN 978-1-26-012238-1
- Kizza: Guide to Computer Network Security, ISBN 978-3-319-55606-2
- Lowe: Networking for dummies, ISBN 978-1-119-25777-6
Disk and file encryption
We recommend the following applications or standards. Some recommendations are based on a talk of Mr. Schumacher from Magdeburger Institut für Sicherheitsforschung. Only use well-maintained and well-tested software for cryptography. Otherwise, your data could be exposed in some way, or you could lose your data.
Built-in file encryption
The Linux file systems ext4, F2FS, and UBIFS natively support file encryption.
- GoCryptFS (uses modern crypto but leaks metadata)
- CryFS (uses modern crypto and hides metadata but is slower than GoCryptFS)
For advanced users, we recommend to validate DNS responses with DNSSEC and use DNS-over-TLS. This combination allows you to authenticate and encrypt your DNS traffic to the DNS resolver. Check our DNS-related articles.
- DNS Privacy Project (collaborative open project to promote, implement and deploy DNS Privacy)
- DNS leak test (see the DNS server that is used by your client)
- List of public recursive name servers on Wikipedia
- DNS Privacy Public Resolvers
- DNS Privacy Test Servers
We recommend Arch Linux for advanced users. Arch Linux allows you to set up a minimal operating system that can be highly customized. Besides, you get current software packages. Try to avoid unmaintained packages from the AUR (Arch User Repository) to keep your system stable and secure.
The following repositories contain useful resources and links:
- Awesome Cellular Hacking
- Awesome Infosec
- Awesome Hacking
- Awesome Security
- Awesome Social Engineering
- Awesome Web Security
- Probable Wordlists
Secure key and password storage
We recommend storing private keys on dedicated security hardware. Furthermore, we recommend using password management software. If available, enable and use two-factor authentication for online services (WebAuthn, U2F, OATH-TOTP).