"... and the Truth shall set you free."

"All TRUTH has to pass three stages:
First, it is ridiculed. Second, it is violently opposed. Third, it is accepted as being self-evident.”
– Arthur Schopenhauer

"Nothing is more powerful than an idea whose time has come."
- Victor Hugo

" The only enemy that humankind has ever had, is the devotion to ignorance ..."

"The only thing keeping the public from using its numbers to force an end to imperialist war-mongering is that most people lack a deep understanding of how horrific and widespread it is. And the only reason they lack that understanding is because of corporate media malpractice" Caitlin Johnstone

“Every time we turn our heads the other way when we see the law flouted, when we tolerate what we know to be wrong, when we close our eyes and ears to the corrupt because we are too busy or too frightened, when we fail to speak up and speak out, we strike a blow against freedom and decency and justice.” – Robert Kennedy

ECOTERRA Intl.

SURVIVAL & FREEDOM for PEOPLE & NATURE

- updated 03. January 2022

The information of this TruthNews Portal is compiled by the global network of ECOTERRA Intl. and the collectives of affiliated organizations like fPcN-intercultural, ECOP-marine, West Papua Network, San Foundation, Ecosphere-Academy etc.

We all hold true to your core values, principles and act with integrity.

[N.B.: We maintain an extensive block-list of IP addresses from where malicious cyber-attacks are launched. If it happens and your registration or login to this site is blocked and you can not use a VPN or proxy, please send a note with that blocked IP address to webmaster[AT]ecoterra.net and we will advise. We don't force cookies and don't store data with the identity of visitors of our website except those provided by subscribers and unless an attempt to damage the site is detected.]

The main language of the site is English - Best is now to choose EcoTranslate, which you find on every page of this site - it is instant and interactive. Alternatively you can go to: https://www.translatetheweb.com/ or click for SpanishGermanDutchDanishFrench translations or here for German to English - Note: Translations may take a moment to load.

IMPORTANT NOTICE IN COVID-TIMES

We are respectfully asking this of all our members, friends and acquaintances as well as all new contacts: We understand that some of us differ in our beliefs regarding how COVID-19 has been assessed and is managed. We also understand that some of you are forced or maybe are downloading voluntarily a COVID19 app, which is promoted "for the greater good, for our safety, for the safety of our loved ones"! We are strongly advising against the installation of any such app, since so far no such app exists, which would fulfil our minimum privacy and security standard.

If we are in your "contacts" with phone number or e-mail and YOU intend to instal any such app, like "Healthy Together" "COVIDsafe" "AB Trace Together" "COVI-Pass" (COVI-PASS is the most horrible - designed by the NWO UN and to be implemented by Britain) or a similar identifying, tracking and tracing apps, please DELETE us from your phone or e-mail contact lists, Facebook, Instagram, LinkedIn, or Twitter pages PRIOR to installing the app on your Smartphone!

Any such app WILL ask for permission to access your contact lists (like horrific whatsapp), and NO ONE has our consent to use our phone numbers, e-mail addresses or any other identifying contact info in connection with these tracking apps that will identify, locate and spy on us without our knowledge or permission. Even Snopes verifies that GPS capabilities are part of these apps and there are several more in development that have raised serious privacy issues.

To educate yourself simply do an Internet search for “COVID19 APP” to read about the implications and ask us for other communication options.

Please feel free to copy and paste this notice to your page or send it on to your contacts.

Thank you for understanding that this is NOTHING personal! ❤

READ: What you need to know about contact tracing apps and privacy and what else your smartphone and bluetooth can do to your privacy you can read HERE. See also more Internet security advise down below.)

“During times of universal deceit, telling the truth becomes a revolutionary act.”George Orwell

The only thing necessary for the triumph of evil is that good men do nothing. – Edmund Burke

We need to put our foot down and say Enough is Enough.

We’re creating a way for people to finally speak up. A better world begins by simply opening the conversation. If you’re feeling like the world has gone mad around you, don’t worry. You’re not alone.

Join ECOTERRA Intl. and become part of the exiting worldwide ENOUGH movement.


- you also can just sign up on this site to get the connection.

---

THE EcoNews SITE

The purpose of this site is mainly an effort of our members to inform each other about truthful news and important developments - a clear path through the information jungle, avoiding fake news traps and misguiding propaganda. 

READ: Online Civility and Civil Rights

ARTICLES

Inividual articles represent outstanding journalism or important information, but do not necssarily reflect the opinion of our organization or affiliated groups.

COMPILATIONS

With an updated compilation of articles, news and information on a specific subject we create pictures that strife to present a holistic view of the given reality on a specific topic as well as a timeline of developments. The time-lined compilations provide deeper insight at a glance and are best viewed, studied and understood on a computer rather than the small screen of a mobile phone (beware of 'smart'-phones anyway).

We are committed to independent, transparent, and evidence-based analysis and strife to distribute only the best information available.

Truth is not what you want it to be; it is what it is and you must bend to its power or live a lie.
- Miyamoto Musashi -

For knowledge transfer and awareness creation the information is also disseminated via RSS feed from this website (at present taken off for security reasons until better RSS solution is found and implemented) and via our specific mailings lists:

“Nowadays, anyone who wishes to combat lies and ignorance and to write the truth must overcome at least five difficulties. S/he must have the courage to write the truth when truth is everywhere opposed; the keenness to recognize it, although it is everywhere concealed; the skill to manipulate it as a weapon; the judgement to select those in whose hands it will be effective; and the running to spread the truth among such persons.”
― Bertolt Brecht, Galileo

MAILING LISTS
Please feel welcome to subscribe to any or all of our free mailing lists.
To subscribe to any group-list just go to https://www.ccmail.ecoterra-international.org/ or send an e-mail to
ECOTERRA Intl. keeps your Personally Identifiable Information (PII) confidential and does not disclose, sell, trade or exchange e-mail addresses or mailing lists.

These are moderated lists [©1972-2022] with low traffic frequency on important issues:

UNIQUE_PEOPLES - Defending natural rights of First and traditional Peoples - especially minorities).
ECOTERRA as CSO strives to be more in the hearts and minds of the people than in fancy magazines or mainstream papers - unlike the mainstream NGOs or their governances with their glossy sites or brochures.
DIVERSE_LIFE - Protection of all species of wild fauna and flora
CLEAN_SKYnSPACE - Protection of the fragile atmosphere of Earth and prevention of harmful human activities in space
NATURAL_FORESTS - Protection of the old-growth or other natural forests and it's peoples
DIVERSE_LANDS - Protection of terrestrial ecosystems
NATURAL_SEAS - Protection of the marine biosphere
NATURAL_WATERS - Protection of the aquatic ecosystems
NATURAL_GENES - Protection against genetically engineered organisms
NATURAL_HEALTH - Protection of human health
NATURAL_ENERGY - Protection of natural energy flows and wise production
NATURAL_SCIENCE - Dissemination of peer-reviewed studies and traditional knowledge
NATURAL_JUSTICE - Protection of Your rights and sovereignty
NATURAL_EDUCATION - Promotion and implementation of holistic and total immersion education including native languages and traditional knowledge
NATURAL_DEFENCE - Protection of our values, our and our children's heritage and future)
Though all our lists remain strictly confidential it can not be ruled out that hacked servers or leaking clouds could be accessed by third party. We therefore go the extra mile and maintain the NATURAL_DEFENCE, NATURAL_FREEDOM lists and others off the grid.
The lists of subscribers to the [NATURAL_DEFENCE] and [NATURAL_FREEDOM] lists will for obvious reasons always be maintained off our or any other server and are kept safely off any cloud. Your email-address is safe with us.
NATURAL_FREEDOM - Secondment to the resistance and uprisings of the real people around the globe against harm and evil
NATURAL_SOLUTIONS - Best practices by out-of-the-box thinking problem solvers
BRIGHT_FUTURE - Visions and rack-maps for our common future
TRAVELnCARE - Protection of free voyage, safe travel and caring visit
SMCM - Somali Marine & Coastal Monitor (All on Piracy, illegal fishing and dumping off the Horn of Africa- internal only - non-public list)
CPSU - COUNTER-PIRACY STATUS UPDATES (public part of the SMCM list - fighting fish- and ship-piracy)
WILD_ROAR / ECO_ALERT - (ECOTERRA ALERT BULLETINS)
FSM - FULL_SCOPE_MEDIA (Free thinking, non-conforming investigative reporting and media releases (hot news, investigative reporting, features & press releases you hardly ever get from the mainstream media) -- English, German or French ListServ
FREE_MEDIA - Press Releases
WTN - WILD_TIMES_NEWS (- the hard-copy for people without Internet access - in English and in vernacular languages (postal address required) 
 
Send all submissions to and do not try to share context or pictures by links to https://drive.google.com or https://dropbox.com. Never dare to send anything via WeTransfer. See proper filesharing options further below.
 
BEWARE and Help: Google and other search engines depending on google have implemented algorithms that filter and censor not only content but also sources. Assist the free flow of information by distributing our content via your own mailing lists and social media networks.
 

What you are told in the darkness,

Speak it out loud in daylight, and

What is whispered into your ear,

Shout it from the rooftops.

FREE MEDIA +++ FREE PRESS +++ FREEDOM OF INFORMATION +++ FREEDOM OF EXPRESSION +++ FREEOM OF SPEECH
 
NOTA BENE: If you run your own mailing list, please feel free to disseminate what you receive from our lists. But please do not use a mailing list run by notorious e-mail address harvesters like MailChimp, who send trackers with your mails and put your friends under a kind of surveillance (if they opened the mail etc.). Security concerned recipients regularly discard MailChimp and similar tracking-mails. Get best advise how to set up your own mailing network from e.g.https://www.postboxservices.com/ or ask them your questions by email via .

CONTRIBUTION of INFORMATION or ARTICLES
YOUR IMPORTANT CONTRIBUTIONS TO ANY LIST AND TO WTN ARE MOST WELCOME!

And so it is to the printing press – to the recorder of man's deeds, the keeper of his conscience ...
confident that with your help man will be what he was born to be: free and independent.

– John F. Kennedy

Please send your genuine contributions in any format (best inline or editable word/odt document) to WILDNET <wildnet[AT]ecoterra.info>.
We support free speech, but proselytising or propaganda screeds, fake news or hate speech will not be disseminated.

Logged-in subscribers can directly post to this portal and provide articles only after having been approved.

Request higher author permissions from

N.B.: For security reasons e-mails from ECOTERRA are very rarely ever sent to these mailing lists with attachments. If you happen to receive a message with an e-mail attachment,please be aware that our sender address might have been spoofed and we advise you to check that mail carefully without first opening the attachment. If you suddenly don't receive mails from the usual list any more, but didn't unsubscribe, your mailbox or your ISP might have been tampered with by (hidden) censorship - please let us know and re-subscribe. Sorry, but if your e-mail address bounces several times, your address will be unsubscribed
since we have to keep a rather strict unsubscription policy. Please re-subscribe, if you suddenly don't receive your mails from the specific ListServ. Avoid having your e-mail with ISPs, who are on the list of fraudulent and/or notorious mail interceptors and trackers like verizon, aol, gmail, yahoo, msn, hotmail etc.

Send us your tips, leaks, hints anonymous, confidential and secure.

Send e-mail to establish first contact:

We rely on information and tips from people like you to help us conduct our investigations. Below are several ways to contact us securely with your hints. If you would like to leave your tip using a channel not listed below, please let us know by sending an anonymous e-mail to
Your security and privacy is of paramount concern to us, and we will not disclose your identity. Although we won’t require your name or other PII, some proposed way or mechanism to get back to you is preferred.

We then also can advise you how to establish secure, anonymous contact with us first via Protonmail and then for the transmission of sensitive documents via Tox. You can use this/us then also as a secure relay for other final destinations. Our sources are protected by law.

Send encrypted e-mail:

Send your disclosures and documents with OpenGPG/PGP encrypted e-mails to after getting our public key from:

pub  2048R/C04B2C00 2010-01-29 ECOTERRA Intl. <>

If it is difficult for you to manage PGP emails:

  Email us via Protonmail:

Send your tips or leaks via your protonmail email account to (but use the webmail on the TOR browser)

Register for a free protonmail account, which allows for automatic end-to-end encryption.

You can make your free protonmail account here - but better is to use the TOR browser already when creating!!!

---

You can also explore a new platform by creating an e-mail with https://www.msgsafe.io

 - but we can not vouche yet for the safety of this provider, since the platform has some features that raise safety concerns.

There you could drop confidential info for us to Collective <>

pubkey: 9D9A F8DB A111 CCAD B7A6 A51C E14C 32EA D025 F943

- but we suggest to use the two other ways (PGP or protonmail-to-protonmail) with very sensitive issues for now.

Send us your tip in the postal mail:

If you prefer to send postal mail instead of using electronic communications, please send first an e-mail and we will tell you the nearest postal address of our network close to you.

Call us with your hint: 

To alert us over the phone, dial our 24/7 emergency lines +49-177-235-908-1 or in Africa: +254-790-486-333 and prepare to let us know some way for us to get back to you.

No SMS please.

SMS or WhatsApp or Telegram or Signal are NOT secure !

 

PLEASE BE PART OF OUR ACHIEVEMENTS

If you can't be together with us on the frontlines, kindly consider to support ECOTERRA's work through our trust fund.
Please send your pledges to ecotrust[AT]ecoterra.net to receive the best and cheapest transfer information.

Since the days when PayPal blocked WikiLeaks and later even BITCHUTE, we didn't trust that corporate payment collector and are with better alternatives now. The withholding of funds donated to the Canadian Convoy of Peace by the criminals of GoFundMe showed once again the traps into which wellmeaning people are lured.

Best ways to support online:

Become a Patron of ECOTERRA on PATREON

https://www.patreon.com/ECOTERRA

or at

SUBSCRIBESTAR

EVERY BIT COUNTS


ECOTERRA BITCOIN (BTC) Account: 1NZ3pVDqWLvyT1WtAxuv4pBWgfKE2L5Lzf

   ECOTERRA ETHEREUM (ETH) Account: 0xC717B5a5E5B7ECFDda8b66408A5fa5BEEA2a47F3

ECOTERRA ETHEREUM CLASSIC (ETC) Account: 0x8140AB51EB62024BD0AE0121c1a539230b85D2dB

  ECOTERRA MONERO (XMR) Account: 49MTSGArQ6EFUA39UAjvNiGGgZLbbtDcuLmZ5zjaZsze5WEMi9aseLsfWKCQvSsdMEKosY283yKeTBwoVPxHy7zqCz243Gd

 

ECOTERRA FLASHCOIN (FLASH) Account: currently inactive

 

For yourself you might want to consider to keep your cryptocoins safe with a hardware wallet.

If you can buy your MainStreamMedia to receive their fake news, please consider to support our efforts to provide the truth.

Donations in-kind are also welcome, send your offer to ecotrust[AT]ecoterra.net for transfer details and see also our present needs for selected areas of operations e.g. HERE

===

ECOTERRA Intl. nodes:

Barcelona - Cairns - Cairo - Calgary- Canaries -Cape Town - Cassel - Caracas - Cebu - Cork - Curitiba -

La Paz - London - Los Angeles -  Nairobi - Paris - Reykjavik - Roma - Stuttgart - Wien - Vanuatu

ECOTERRA - FIRST PEOPLES & NATURE FIRST!

https://www.ecoterra-international.org
GLOBAL 24 h EMERGENCY RESPONSE PHONE LINE: +49-177-235-908-1 (Vodafon makes sometimes probems)

AFRIKA (and 2nd Global) 24 h EMERGENCY RESPONSE PHONE LINES: +254-790-486-286 or +254-714-747-090

“For us, warriors are not what you think of as warriors. The warrior is not someone who fights, because no one has the right to take another life. The warrior, for us, is one who sacrifices himself for the good of others. His task is to take care of the elderly, the defenseless, those who can not provide for themselves, and above all, the children, the future of humanity.” Sitting Bull

Our work as Human Rights Defenders is firmly based on UN GA Res. 53/144. Declaration on the Right and Responsibility of Individuals, Groups and Organs of Society to Promote and Protect Universally Recognized Human Rights and Fundamental Freedoms

We thereby hold the right, individually and in association with others, to promote and to strive for the protection and realization of human rights and fundamental freedoms at the national and international levels.

Become a pro-active-member of ECOTERRA Intl. - write to office[AT]ecoterra.net or of fPcN-interCultural (write to Friends of Peoples close to Nature via collective[AT]fpcn-global.org) or of our Marine Group: http://www.ecop.info (write to marine[AT]ecop.info).

Green is Good: Environmentalism per se is not political - it is sanity!

[However, this statement comes now with a certain caveat due to the recent developments in politics worldwide, where many have turned into watermelons (outside green, but inside bright red) and pose a great danger to all those Indigenous people as well as the more conservative (in the true sense of the word) scientists and professionals in the environmental fields.]

ECOTERRA Intl. has no Petrol-Dollars like other "CONservation" groups see:
http://www.thenation.com/article/174149/why-arent-environmental-groups-divesting-fossil-fuels

Please help by becoming a donating subscriber and supporting member today!
For making donations and to receive your personalized donation reward:
Please contact: ecotrust[AT]ecoterra.net

DO YOU NEED AN ECO-STRAIGHTLINER?
Please request contacts for highly qualified scientists (ecologists, marine biologists etc.), lawyers, specialists and environmental experts or investigative journalists with proven track record of not being lured or bullied by corporate or governmental money via office[AT]ecoterra.net
These are all no-nonsense people with vast experience.

Ask for the support of an ECO-Volunteer: Mail to office[AT]eoterra.net or get trained yourself to become one of our Eco-Guardians.

The Courage Of Dissent

BUT NEVER FEEL DESPERATE OR ALONE

- you will find many helpful contacts on the different pages.

---

OUR GUIDING PRINCIPLES:

Truthfulness,Tolerance, Empathy, Compassion, Forbearance

THE TEN Indigenous Peoples COMMANDMENTS

1. Treat Earth and all that dwell thereon with respect.

2. Remain close to the Great Spirit, in all that you do.

3. Show great respect for your fellow beings.
    (Especially Respect Yourself)

4. Work together for the benefit of all Humankind.

5. Give assistance and kindness wherever needed.

6. Do what you know to be right.
    (But be careful not to fall into self-righteousness)

7. Look after the well-being of mind and body.

8. Dedicate a share of your efforts to the greater good.

9. Be truthful and honest at all times.
    (Especially be truthful and honest with your self)

10. Take full responsibility for your actions.

Protecting Our Future

“Each time a man stands up for an ideal, or acts to improve the lot of others, or strikes out against injustice, he sends forth a tiny ripple of hope, and crossing each other from a million different centers of energy and daring those ripples build a current which can sweep down the mightiest walls of oppression and resistance.” – Robert F. Kennedy

__________________________________________________________________________________________

Maintain Internet safety:

On the Internet you have to be aware that the Neo-Imperium consists of the so-called "5 Eyes" states: USA, CDN, AU, NZ, UK, and their allies (9, 14 eyes alliances) whereby additionally through the USA all NATO states and through the UK all Commonwealth states are embedded. And make no mistake: Israel is not Number 6 - it is the hidden Number 2.

READ: Five Eyes, Nine Eyes & 14-Eyes Countries and VPN Jurisdiction and latest comments.

WHAT AND WHO ARE THE 5, 9, 14 EYES ?

Here is a brief breakdown of each of the three Alliances:

Five Eyes: US, UK, Canada, Australia, New Zealand
Nine Eyes: Five Eyes + Denmark, France, Holland (The Netherlands is the NATO cyberspy-hub), Norway
Fourteen Eyes: Nine Eyes + Germany, Belgium, Italy, Sweden, Spain

The Nine Eyes and Fourteen Eyes Alliances are essentially extensions of the original Five Eyes Alliance. While these countries may not all share as much information with each other as the Five Eyes Alliance, they still actively and willingly participate in international intelligence-sharing. Not many (relatively) free countries are left - choose wisely.

In addition to these confirmed alliances, it is also worth mentioning another handful of countries that have been caught or suspected of exchanging information with the Fourteen Eyes Alliance and Third Party Contributors: Israel, Japan, Singapore, South Korea

It’s highly recommended that you choose a VPN (and also your VPS or server location) outside the jurisdiction of the five eyes, nine eyes and fourteen-eyes alliances and dependent countries.for full anonymity and data protection.

And check out: The Internet Kraken ...

BE AWARE

It’s up to all of us to protect and enhance the future of the Internet.

By using the Internet Impact Assessment to show policymakers how laws, decisions and trends could impact the foundation of the Internet responsible for its success, we can help make sure it keeps working for everyone.

Three Totalitarian States Threaten the Internet:

RUSSIA’S SOVEREIGN INTERNET LAW Network operators will have to provide the regulator, Roskomnadzor, with network diagrams and technical design of the communications facilities so that “technical means of countering threats” (TMCT) can be installed. If the regulator identifies a security threat to its public communications network, it can use TMCT to change traffic routing, close or limit communication lines and channels, directly contact user, and change the configuration of communications. If Roskomnadzor declares a communications emergency, it will be able to control routing and other operator decisions.

U.S. CLEAN NETWORK PROGRAM The U.S. Clean Network program challenges the open architecture of the Internet at its very core. The “Clean Carrier” and “Clean Cable” programs would force vast amounts of Internet traffic to route into third countries, extending the distances data must travel, increasing the potential for surveillance and manipulation of Internet traffic, increasing the risk of Internet outages, and in general increasing costs to everyone on the Internet. Having a government dictate how networks interconnect impacts the Internet’s agility, resiliency and flexibility.

THE CHINA MODEL China’s big three operators China Telecom, China Unicom, and China Mobile run 70% of networks and much of the backbone infrastructure of smaller networks. They run the three gateways which filter Internet traffic in and out of China. The choke-points that these three companies hold on interconnection with all networks outside of China severely limits the access of China’s network providers and Internet users to the global Internet. The Internet is an incredible resource because it was built to foster a culture of collaboration and participation for the collective good. But the open architecture that makes it strong and successful is not invincible. Governments and businesses are increasingly making decisions that could harm the Internet’s foundation, and they may not even know it. Actions that impact any one of the Internet’s critical properties could erode the foundation as a whole.

To learn more and see the toolkit, please visit: internetsociety.org/impact-assessment

---

How to deal with Cyber Security Threats - 18 Types of Cyber Security Threats You Should be Aware of and How to Deal With Them

Newcomers to the world of cybersecurity might find this First Look on Internet Security useful.

KNOW: Computers with Intel Inside might be compromised - MUST WATCH - Secret backdoor since 2008

WATCH: Why privacy matters even if you have 'nothing to hide' (and send this to anyone, who tells you that stupid sentence).

Take a minute and watch also this FANTASTIC video by John McAffe. Everyone should watch this, it is not only about p*o*r*n. This really lays out the security dilemma extremely well.

RIP John - John McAffe was a real fighter for internet freedom. He was wacked at the hands of the Spanish "authorities" on the bequest of those from the USA.

Google WILL pass your search results over to the FBI if they meet certain criteria

REMEMBER: This applies to all Android devices even if they use alt search engines, or ANYONE using Google's browser Chrome.

How do I stop Google from using my search history to build a profile in the first place?

Simply head over to Google and click your profile in the top right (log in if needed) > Manage your Google Account > Manage your data & personalization under Privacy & Personalization > Go to ad settings under Ad personalization. You can turn personalized advertisements off there.

How do I ruin 'My Search History' grabbed by Google?

Google would like you to believe that it provides their services for free, but they don’t. You are paying a heavy price with your personal data.

Think about it – Google receives around 63,000 searches per second on any given day and it stores every single search. Google knows more about you than you know about yourself. Everything from what you eat and drink and where you go, to who your friends are, your political allegiances and even your sexual preferences.

Google uses your searches to build an incredibly detailed profile of your self in order to sell you products and services later down the line. That’s how the company makes money. So what if you could throw Google off the scent by conducting random searches. Well, Ruin My Search History (RMSH) takes this concept to the logical extreme.

Hit the button and RMSH will take over your browser and immediately cycle through random search terms ranging from the outright boring to the type of thing that might get your name on a list somewhere.

Ruining your search history with RMSH is lulz - so the only question is: How far do you dare push it?

Our advice: You can use it once in a while, but don't spoil your firewall or privacy browser with it.

---

Good security advise for journalists: https://cpj.org/2019/07/digital-safety-kit-journalists.php

Old (2016) but still valid advise (except maybe concerning SIGNAL) from the EFF: Digital Security Tips for Protesters (on and off the streets)

Good compilation: Most Secure Messaging Apps in 2020 - good, because they speak openly about the downsides, pitfalls and dangers of e.g. Signal, Telegram, Viber, Wickr and Wire (they did, however, not look at the the good options offered by BRIAR or TOX - see below).

CHECK'EM OUT: Best Communication Apps

SECURE MESSAGING APPS COMPARISON "GOVERNMENT IS NOT THE SOLUTION TO OUR PROBLEM; GOVERNMENT IS THE PROBLEM"

START ACTING:

Very Important: Check you device for installed SPYWARE -->> Spyware Watchdog Catalog

How to protect your online privacy in 2019 | Tutorial

or How To Become Anonymous And Secure Your Privacy 2020

Learn everything you can do to get as close as anonymous as possible: The ultimate & complete guide to becoming anonymous, private, and secure on the internet. (October 2021)

Many people wrongly assume their government or the big technology companies will protect their privacy in the digital world but that is a big mistake. The government and companies like Google will do anything they can to track your online travels. It is entirely up to users like you and me to protect ourselves. Let's face it, most of us live a good part of our lives online, and it's important to protect our online activities from prying eyes.

CHECK Pixel Privacy out.

Block Federated Learning of Cohorts (FLoC)

A new technology is currently being rolled out to browsers to replace third party tracking cookies. This technology is named Federated Learning of Cohorts (FLoC) and you can read more about it here and hereFacebook and Google are Evil. Our website blocks this technology, but you should also choose another browser and deinstall Chrome.

MUST READ: Spyware in Browser Check and Critical Browser Review

10 Alternative Browsers

 
Warning: Microsoft Browser EDGE is a BIG THIEF[17. November 2021] Microsoft Edge enables synching without warning or consent, which means that Microsoft sucks up all of your bookmarks. It’s actually worse: Edge urges users to store passwords, ID numbers, and even passport numbers, all of which get uploaded to Microsoft by default when synch is enabled.

How to be anonymous on the web? Tails, Linux (Whonix, Knoppix), Dark net, Tor.

EMERGENCY-GET INVISIBLE DIGITALLY RIGHT NOW!!!

Premiered Jun 2, 2020

Global Witness

FOR EDUCATIONAL PURPOSES ONLY! "When they say Peace , peace, there is NO peace". Educational links spoken about and some not spoken of below are to inform you ONLY. This video does not suggest you do anything but to inform yourself.

TOR Project: Anonymous Browser (For Educational purposes only) https://2019.www.torproject.org/proje...

DISTRO Watch: Thousands of Operating systems to do almost anything!!! https://distrowatch.com/

TAILS OS: Thumb Drive OS https://tails.boum.org/install/win/in...

LiLi USB: Puts the Operatings system (OS) onto the thumb drive https://www.linuxliveusb.com/

---

Get good PASSWORD SECURITY

Read about the road to password security.

Two-Factor Authentication What Is It and Why You Should Use It

For the best computer & Internet safety tools check regularly HERE: Privacy Tools

Measure Internet censorship Get the OONI Probe (Android 4.2 or newer, Windows 64-bit only, macOS) Are websites and social media apps blocked? Is your network unusually slow? Run OONI Probe to find out!

Ahead of the curve: Overview of OTF supported projects.

Opt out from global data surveillance programmes:

To get secure asynchronous chat free-of-charge check out UnseenP2P - the Unseen Communicator for secure P2P communications is now ready for early testing. You should only use this for testing, there are still improvements being made. [The server based in Iceland https://www.unseen.is has been taken offline (too high costs to maintain that service) but https://www.unseen.tw is still operated.]

Excellent distributed, server-less platforms that even can work like e-mail are TOX https://tox.chat/ - with voice or video or video chat - or BRIAR https://briarproject.org and still https://bitmessage.ch/

Please check regularly for an updated list of e-mail recommendations: http://www.prxbx.com/email/

The moment you receive the first spam-mail in a personal or private e-mail account, whose address you have never put on a public website or entered into a list on the internet, you have to change that account, vet the address-book of the account and let your correspondents know the change of address. Let the old account exist for a while to reveal unreliable contacts or catch the leaker.

Check out: https://www.mailpile.is/

For free, encrypted and secure PGP e-mail (incl. self-destructing e-mail) sign up with https://protonmail.com that offers also a free VPN (best via TOR)

Mr. Ladar Levison, the owner of Lavabit[dot]com, which was forcibly shut, because whistle-blowers like Julian Assange or Edward Snowden had their e-mail addresses hosted there and the owner was served with a FISA warrant, thereafter said:

"...I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States of America."

N.B.: LAVABIT recently opened again - have a look (transparent privacy policy but it is based on servers hosted in the USA and is costly).

BETTER E-MAIL SERVICES:

Check out: https://ctemplar.com/about/ (free: 1 GB + Tor onion address), https://www.protonmail.comhttps://www.protonmail.ch (free: 500 MB + free VPN) 

PLEASE do NOT use any longer those e-mail providers like gmail, who do not guarantee privacy, data safety, ownership and/or security. Change every lawyer or medical doctor who does not guarantee your data security. Confidentiality is a prerequisite for attorney/client and doctor/patient privileges.  See also HIPAA compliant messaging and data security for the medica devices. FREE e-book for the absolute minimum protection.

Check them out:

PreVeil Email lets you send and receive encrypted emails using your existing email address. Messages in these new mailboxes are encrypted and stored on PreVeil’s servers. 2 GB of storage for free accounts

MailFence

Require payment:

Indian CRYPTOMAIL startup [Has with CryptoBox realized an idea of the late John McAfee]

https://cryptomail.tk/

COUNTERMAIL

Virtru - integrates with Google and Microsoft (restricted free trial)

===

NConnect securely via best VPN: https:cryptostorm.is/ 

Usually a paid service, they offer Cryptofree as cryptostorm's free VPN service for activists.
It's only limitations are that there's only one server to choose from (in France). [CAVEAT: The French authorities have legisltion in place that allows them to just walk into any data centre in France and do what they want. However, Cryptostorm had made a Supuku pledge since inception - i.e. to rather self-destruct than to allow any tampering - and has now also a CANARY in place.]
Also, it doesn't include any non-essential features such as transparent .onion/.i2p access or port forwarding.
Other than that, it's setup exactly the same as the paid nodes. Same cryptography, same security features, same no logging policy.
Anyone is free to use it for as long as they like. There's no time limits, so you can stay connected to it as long as you want.

There's no longer any bandwidth limitations on Cryptofree. At first we were throttling clients to 160kbps down, 130kbps up, but we've decided to remove that throttle.

To use cryptofree, simply follow the guides on https://cryptostorm.is/#section6,
and whenever configs are mentioned, you would use the ones at https://cryptostorm.is/configs/cryptofree/ instead.
Instead of entering your cryptostorm token as your username, you would enter any text for the username (and password).

For Windows users, our widget is the easiest way to connect to cryptofree.
Just select it from the drop down list and click the Connect button:


We also have a free WireGuard server, see https://cryptostorm.is/wireguard

In most cases, a free VPN should be avoided because of the accurate saying:
"If you're not paying for the product, you are the product"
This is very true for the majority of the free VPNs out there, because they have to make money somehow to pay for their servers.
What most of them do is inject ads into your traffic, or they'll monitor everything you do and sell that data to advertising companies.
Some have been caught doing more malicious things like injecting browser exploit kits into web traffic, turning their VPN clients into zombies in their botnets.
https://www.bleepingcomputer.com/news/technology/vpn-provider-accused-of-sharing-customer-traffic-with-online-advertisers/
https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf
https://threatbrief.com/using-free-vpn-services-really-safe/

With cryptostorm's cryptofree service, you don't have to worry about any of that.
cryptostorm pays for cryptofree. We make money off of cryptofree because cryptofree is in itself an advertisement for cryptostorm.
We have no need to do any of the above schemes to make money off of cryptofree, and if we ever tried to, it would make cryptostorm look bad.
---

Independent advise on the quality of VPNs and E-Mail services - assessing almost 200 VPNs in detail.

Or see and search: VPN LIST (constantly updated database)

The Best VPN Services (TESTED) Last Updated: February 26, 2020

Another good advisor: Best Free VPN of October 2020 (same group now warns of 360 VPN - see ALTERNATIVES)

Free and recommended VPN solutions are:

1. Hide.me is among the best free VPN providers that give you a 10GB of monthly data limit. Hide.me Free: Limited free server network and 10GB data cap. Read Summary.

2. ProtonVPN with servers in The US, The Netherlands, and Japan -  Requires free subscription. A highly secure free VPN with unlimited data. Read Summary. (FREE VERSION: NO TOR over VPN !!!)

3. TOR (@torproject): https://t.co/VcKKq5FSocy

4. Atlas VPN ranks among the best free VPN providers you can download directly and start using. (Widows only 64bit version)

5. TunnelBear (@theTunnelBear): https://t.co/QoKPwagd8l A fully-functional free service with a 500MB data cap. Read Summary.

6. Tunnelblick is a free and open source (FOSS) OpenVPN client for macOS and OS X. It allows you to connect to almost any VPN service via the OpenVPN VPN protocol using standard OpenVPN configuration files. Technically speaking, Tunnelblick is just a graphic user interface for the OpenVPN Community Software. This means that Tunnelblick is the closest thing available for Mac users to the official Windows-only OpenVPN GUI. Unsurprisingly, this means that it’s the best OpenVPN client for Mac. Review

Critical: Windscribe ranked previously as the best free VPN provider with an initial 2GB data limit with 10GB of monthly data limit when you subscribe by your email address. Windscribe Free: It was the best free VPN for secure streaming and torrenting. Read Summary. BUT it was bought out and is now BSVPN (nomen est omen = bullshit VPN?) - it engages now in aggressive backchanneling and browser profiling, monitoring its use by thereby IDed users. Most of the VPNs are security agency honey pots - hidemyass is owned by the FBI.

Not recommended:. Avira Phantom Free A basic free VPN with a 1GB monthly data limit. Read Summary.It is sai to be best for first-time users, BUT the promise for a free 92 day test is FALSE - you can download the components for free, but to make them work you still have to pay. "Who lies once ... you can't trust" - especially if from colonized Germany.

We listed below the best free VPNs and the key purposes we recommend them for:

  • Best for fastest connectionsHide.me Free
  • Best for unlimited data and public WiFiProtonVPN Free
  • Best for travel and server locationsTunnelBear Free

AVOID: Psiphon is a circumvention tool from Psiphon Inc. that utilizes VPN, SSH and HTTP Proxy technology to provide you with uncensored access to Internet content. If our website or download links are blocked or censored in your country, you may request to have the downloads sent to you via email. Your Psiphon client will automatically learn about new access points to maximize your chances of bypassing censorship. https://www.psiphon3.com/en/download.html Psiphon (@PsiphonInc) download: https://t.co/sB4ae851kM CAVEAT: PsiphonPro reportedly sells data of users and their email addresses.

What’s Better: A VPN Or Proxy?

A proxy and a VPN are both privacy-enhancing tools with the same purpose but perform differently. While a proxy hides your IP address, a VPN also encrypts it from both ends and makes it impossible for anyone to view what you’re doing on the web. Using a VPN over a proxy is a better choice for reliability and security. 

Besides this, there are other areas where VPN wins over a free proxy like:

  • A VPN offers a vast server network with less ping time and establishes a quick connection. 
  • You can unblock sites and stream content from anywhere. 
  • A VPN provides better security, customization, and reliability. 
  • They have a strict no-log policy and even don’t serve you with ads. 
  • Proxies are often really slow and not reliable for privacy.

VPN REVIEWS

Please Note: 

VPN's have their uses, BUT to us they are only useful to obscure, not necessarily to anonymize, you.

By definition, a VPN (Virtual Private Network) is an encrypted channel between IP addresses (even those "hidden" behind a NAT router).  By this definition, even an HTTPS connection qualifies. The only difference is regarding scale. Is all IP traffic encrypted (typical VPN "service") or only a single instance through a defined port (typical HTTPS traffic)?

What is important is to understand that your ISP (Internet Service Provider - and hence everyone) knows whom you are communicating with. The VPN "service" provides some obfuscation to the observer of the WHO you are and from where you connect, since all traffic goes to that same IP address, which is not yours.

Whether or not "somebody" knows you are using a VPN is kind of irrelevant. It is the WHO and WHAT that matters.

A VPN typically uses encryption on the data packet, so the WHAT is obfuscated (obviously, one should ensure end-to-end encryption).

A VPN (service) also typically relays said data packet, so the WHO is obfuscated, at least for the ISP. The ISP then only knows YOU are talking to the VPN host, but the ISP (who might be compromised e.g. by a regime) doesn't know WHO the final destinations of your packets are. 

Please note, the VPN "service" itself does know this information, even if the service has more hops (like with Tor). Since it is geometrically more difficult to compromise a network of independent relays than a single "service", Tor has its uses. By using a VPN one simply transfers the "risk" from one entity (eg: ISP) to another entity (eg: your VPN provider or the Tor nodes).

Concerning the debated question: Tor over VPN, VPN over Tor, or Tor standalone? -->> read THIS and understand THISTor over trusted VPN [i.e. the method that entails connecting to your trusted VPN app (best unpaid/free) first, then executing the Tor browser] can be a good way to protect yourself e.g. from rogue regimes, but usually slows your traffic and free offers by trusted VPNs have certainly very limited bandwidth per month. TOR over free CrytostormVPN (or o mobiles free CatVPN) is a good solution.

Also know that maybe you could unknowingly sign up with a criminal VPN provider, whose core clients go against you. This one was now taken down: DoubleVPN allegedly covered for criminals. All you see on https://www.doublevpn.com/en/ is:

The so far still legit VPN service that provides a double VPN connection is well known NordVPN, which unfortunately is too expensive for most activists and human rights advocates. Which VPN to choose also depends on the threat model applicable for each case.  

And now the UN has become even worse: 

BETTER PRACTICES:

Stop searching with Google! Also DuckDuckGo has now been compromised (Amazon). They all collect your search-data.

Especially for users of anything "GOOGLE" it is recommended to do a google-detox - see: https://datadetox.myshadow.org/en/home

REMEMBER: Duck Duck Go claims to not track you, but uses Google and operates via insecure Amazon servers.

Better search with

https://searx.org - a privacy-respecting, hackable metasearch engine - open source - with 10 basic categories, incl. social media

https://www.gibiru.com, which delivers 100% private results from google and other search engines.

https://www.ecosia.org - each search contributes to tree planting !!! (but has also Amazon server connect and in Germany, which is ...).

https://gexsi.com/ - each search contributes to projects within the framework of the Sustainable Development Goals (SDGs).

https://www.startpage.com, it delivers 100% Google results in total privacy. Like StartMail has been sold and has become questioanable.

lhttps://www.qwant.com/ - liked by the francophile, but don't add it to Chrome, because otherwise you have Google again in your search.

Try a counter-search with Russia's largest search engine https://yandex.com - independent of google.

Probably the best search engine out there not tied into what the FBI can demand answers from is Yandex, ignore the Russian and type in English, it will give you English results. Yandex is the only alt search engine as powerful as google and you get TOTALLY different results, if it is censored it is certainly not censored the same way.

Check out former AltaVista, which is now yahoo, but doesn't follow google censorship.

Online Conferences

BEWARE OF ZOOM - and shun it (The communist Chinese CCP can listen into it, snatch your session and terminate your account!). Zoom has serious privacy concerns.

For trusted P2P (video) collaboration better install JITSI - or go directly to https://meet.jit.si/ - it's easy and much more secure.

Another excellent solution is JAMI with its new version "FREEDOM"  and especially the new version of Jami dubbed "TOGETHER" with enhanced conferencing. People on the same network do not even need an active Internet connection to stay in touch. When the Iranian government shut down the Internet for a week in 2019, many activists and young people used Jami.

Check out ELEMENT for powerful Matrix- (beware of compromises server operations) or self-hosted group collaboration, if own dedicated servers can also be physically 100% controlled and self-managed.

Check: Best ZOOM Alternatives or in German: Tests auf ERFAHRUNGEN basierend.

LEARN ABOUT OPEN SOURCE SOFTWARE

A guide to staying online if the internet or social media get blocked in your country

ALERT: Hackers are buying domain names with a similar web address to the email service providers like Tutanota or Protonmail, and creating clone login pages. A user who logs into one of these fake pages will have compromised their login details and given hackers access to their accounts.

The cybersecurity research group CERTFA - the Computer Emergency Response Team - has reported an increase in sophisticated phishing attacks against journalists and human rights defenders. These attacks, which are global, have also targeted individuals who use more robust email providers or two-step verification (2FA) for their email and social media accounts.

Other reports detail how journalists and activists using Yahoo and Gmail were sent emails appearing to be from those email service providers, stating that there had been an unauthorized attempt to access the account. The email asked journalists to enter their email and password details, which hackers were able to check in real time and send out a fake two-step verification request either as a SMS, via the authenticator app, or via push notifications. At least two different groups of hackers were able to gain access to accounts and constantly monitor communications.

Good Firefox Browser addons are: uBlock Origin | Cookie Autodelete | HTTPS Everywhere | DecentralEyes | Noscript

---

You need to see this...Society is Changing - Rob Braxman Tech
https://invidious.snopyta.org/watch?v=nCFbgWjgp2M

USE  DEGOOGLES ANDROID MOBILPHONE

Do this! remove big tech from your life. I de-googled my devices (with help of rob braxman info) when they 'launched' the corona psy op. Give them a hard time tracking you. #noconsent

What's it like to use a de-googled phone in real life?
https://invidious.snopyta.org/watch?v=mqSCmT5S-2w

A good, priceworthy and degoogled Android mobile-phone with removeable battery is e.g.:

Hardware: TERACUBE 2e (non-Google hardware) https://myteracube.com - rated as best "de-googled" mobile phone for PRIVACY and security.

Software: https://e.foundation using E/OS https://grapheneos.org - see also: https://esolutions.shop

AppStores: apkpure.com, F-Droid, Aurora Store

Secure your Android phone: http://www.futuretensecentral.com/dcentral1

---

For good reason you will not find the real ECOTERRA on fascistbook, google+, twitter or any other of those in reality asocial and dangerous surveillance media. (beware of fake accounts made there by criminals!)

Ad-mails (spam or UBE/UCE) are terrible, but don't use ISP- or web-based filters, since you never know their criteria. Stay in control and instal the anti-virus, anti-spam and firewall yourself - they are unfortunately necessary in these days - and maintain them yourself on your system! If you are forced to instal pre-filtering then choose a service like http://www.junkemailfilter.com/ who guarantees your mail safety, supports the EFF and the work of progressive, non-profit NGOs.

To the deaf still on aol/yahoo/gmail etc.: Use at least http://www.mailvelope.com

IMPORTANT: To ensure delivery of your mails, please add "@ecoterra-international.org" and "@ecoterra.net" to your address book and the "whitelist" of your spam-filter. Tell your ISP or company's IT group to allow this addresses to pass through any filtering software they may have set up. If our e-mails don't reach your Inbox, also look in your "Bulk-Mail" or "Junk-Mail" folder. If you write to us and you don't receive a response within two working days, please send your mail again - it most likely was intercepted or got lost on the way.

How to whitelist an email address with Gmail (but you should get rid of your gmail account anyway)
Sign in to your account at Gmail.com and do the following:
Add the address to your contacts
Add the full email address that is sending you email (e.g. @ecoterra.net, @ecoterra.info, @ecoterra-international.org) to your Gmail Contacts. Google will usually deliver email from addresses that are in your Contacts.
Mark messages as ‘Not spam’
If Gmail has marked emails you wish to whitelist as spam, tell Gmail the emails are not spam.
1. In Gmail, navigate to the spam folder.
2. Search for emails containing the domain you wish to whitelist (eg onlinegroups.net).
3. Select all the emails shown.
4. Click More and then Not spam.
———————-
How to whitelist an email address with Outlook.com
For Outlook.com, Windows Live Mail, Hotmail and MSN Mail, sign in to your account at Outlook.com and do the following:
Add the address to your contacts
Add the full email address that is sending you email (e.g. @ecoterra.net, @ecoterra.info, @ecoterra-international.org) to your Outlook.com Contacts. Outlook.com will usually deliver email from addresses that are in your Contacts.
Add the address to your safe senders
Click the cog icon in the top-right corner and then More mail settings
Select Safe and blocked senders and then Safe senders
Add add the domain of the email you want to whitelist to the list of Safe senders
Return to Safe and blocked senders and then select Safe mailing lists
Add the email address of the online group you want to whitelist to the list of Safe mailing lists
———————————
How to whitelist an email address with Yahoo! Mail
Sign in to your account at Yahoo! Mail and do the following.
Add the address to your contacts
Add the email address that is sending you email (eg ) to your Yahoo! Mail Contacts. Yahoo! will usually deliver email from addresses that are in your Contacts.
Create a filter for the address
Mouse over the Settings menu icon and select Settings
Click Filters and then Add
Enter a Filter Name
Either
enter the domain (like @ecoterra.net) of the email you want to whitelist in the Sender field, or
enter the email address of the online group you want to whitelist in the Recipient field
Select Inbox as the folder to deliver the email to
Click Save and then click Save again.
Please Join Our Email newsletters Today For The Latest breaking News On The Web. 

Try as much as possible to use a secure VPN like https://cryptostorm.is, encrypted e-mail (PGP, GnuPG) see: https://www.enigmail.net/home/index.php and TOR - see: https:www.torproject.org/about/overview.html.en but read also the CAVEAT on TOR on this website. Please request our public PGP/GnuPG-keys!

CAVEAT LECTOR ! NOTICE: Our email and any files or very rarely attachments transmitted with it may be confidential and/or privileged. The information is intended solely for the use of the individual, entity, group or list to whom it is addressed, except if earmarked for widest distribution. Please see also our disclaimer and copyright rules at http://www.ecoterra.net/sites/disclaimer-site.htm

All ECOTERRA Media and Disseminations are re-distributable under Creative Commons Non-Commercial Share-Alike Licence, but kindly do not take the ECOTERRA free mailing list services for granted!

Become a Friend of ECOTERRA and make a donation NOW to help keep ECOTERRA FREE and INDEPENDENT.

Unless other sources are quoted or other indications given:
© means: Copyright © ECOTERRA Intl. 1972-2022 - all rights reserved
CL means: CopyLeft: Copyright except for non-profit making individuals, initiatives or organizations, if used to positively portray what it wants to achieve, is not misquoted and the source is credited. If you are not sure what it originally was set out to promote you must ask the author or creator first. This means that you can use it (text, graphics, pictures etc.), if you are not making money out of it, do not have the intention of doing so and support the cause. If you don't, you must get permission from the author to use it. Please send us a copy of your re/publication.

ECOTERRA List-mails usually are CL. Unless otherwise stated by the author, all content is free for non-commercial reuse, reprint, and rebroadcast, on the net and elsewhere. Opinions are those of the author and/or contributors and are not necessarily endorsed by the ECOTERRA Intl. collective.

All conten ton the website is published under the OpenContent License, if nothing else is mentioned, but some rights are reserved under the CreativeCommons Licence.
AR means: Anti-Copyright: Use freely for whatever you want it. It comes from the perspective that copyright should not exist at all or that there is no need to copyright the information or image as we wish it to be distributed freely and reused in whatever way.

BEWARE: We have the right to freedom of opinion and expression; this right includes the freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Art. 19 UN-UDHR

Any and all of our communications are protected by the UN Resolutions A/RES/45/120, A/RES/62/119 and especially A/RES/53/144 as well as EU - Annex doc 10111/06 conc. UN Resolution 217 A (III) and the Paris Charter for a New Europe see: http://www.osce.org/node/39516 .
We do not tolerate censorship nor intercepts of our genuine communications (e-mails, messages, chats, phones, websites etc.).This motion is hereby served as notice to all Interceptors, censors or blockers - no matter under which pretence whatsoever they operate - and will be used in court against them.
The Court of Justice of the European Union has ruled <http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:62010CJ0070:EN:HTML> on 24 November 2011 already that generalized content filtering violates fundamental rights. The court has thereby recognized the impact of Internet filtering on freedom of expression and freedom of information.
In addition the European Court of Justice <https://www.privacyinternational.org/sites/privacyinternational.org/files/downloads/press-releases/216980523-judgment-of-the-ecj-in-digital-rights-ireland-data-retention-challenge.pdf> invalidated on 08. April 2014 the European Union's 2006 Data Retention Directive policy, ruling that indiscriminate data retention is completely unacceptable.
These are crucial steps forward in the defence of Internet freedom. 
Europe's top court, the European Union Court of Justice (ECJ), also decided on May 13 2014 <http://www.reuters.com/article/2014/05/13/eu-google-dataprotection-idUSL6N0NZ23Q20140513> that People must be able to remove their digital traces from the Internet and can ask e.g. Google to delete sensitive information from its Internet search results.

Learn more about:

Communications Data Retention <https:www.privacyinternational.org/issues/communications-data-retention>
Communications Surveillance <https://www.privacyinternational.org/issues/communications-surveillance>
Data Protection and Privacy Laws <https://www.privacyinternational.org/issues/data-protection-and-privacy-laws>

The United Nations' top official for counter-terrorism and human rights (known as the Special Rapporteur) issued a formal report <https://www.firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/> to the U.N. General Assembly on 15. October 2014 that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. "The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether," the report concluded.

ECOTERRA says: We have nothing to hide, but we have to protect: Our universally guaranteed rights to privacy, free speech and data security are protected and we protect them too! Privacy is a basic right rather than a concession! Watch: <http://www.youtube.com/watch?v=pcSlowAhvUk>

What you always wanted to know - check it out at the Environment Portal https://ecoterra.info or via the Eldis Gateway to Development Information https://www.eldis.org, or the relaunched EcoEarth Portal https://ecoinbternet.org , or via the WHALE http://whale.to or on health via https://naturalnews.com or on history via http://realhistoryww.com or http://www.truedemocracy.net/

Alternatives

The list below contains products that are alternatives to hose recommended above already or for sending kind of E-Mails and/or messages with attachments.

Combined products

An interesting development is to run UnseenP2P via a Rasberry Pi:

https://build.opensuse.org/package/show/home:unsenep2pdev/P2P

A successful Raspberrian OS version 9.0 can be build as shown here: https://build.opensuse.org/package/binaries/home:unsenep2pdev/P2P/Raspbian_9.0

Download latest (14. December 2020) https://download.opensuse.org/repositories/home:/unsenep2pdev/Raspbian_9.0/

While working your Rasberry check out: https://pi-hole.net/

(A)social Media

For good reasons we have as group never bothered to be on FaceBook, Twitter, Instagram etc. and since the professional network LinkedIn changed ownership members left from there too. We also can't really trust Telegram, Signal or any platform that has strings attached. Parler, recently deplatformed by Amazon, is back. Apple, Google, Facebook, YouTube, Twitter, Vimeo, Pinterest, Mailchimp and other tech giants are all committing treason and fraud. They live of collecting your data to sell them to the highest bidder - so be aware and beware.

People are moving from twitter, Fascistbook, LinkedIn and Youtube to https://gab.com,  (U.S. right-wing core, but also large number of subscribers and their groups from Australia, Germany, France etc.) and Mastodon (https://joinmastodon.org/) or

https://parlor.me/ (resurrected, but no longer really trusted) or 

https://mewe.com (that claims to have 'secret' P2P chat) ,

https://telegram.com (which more and more people believe is a honeypot).

For video channels https://www.bitchute.com (is the top reliable video-sharing site).

The policies of the alternatives are certainly better than the BigTech providers, but please be aware that they still are server-based and thereby vulnerable from that side.

MUST SEE AND CONSULT: XENMASTER PRIVACY TOOLS and best Privacy Tools compilation.

Instant secure messaging

The future (if any) runs clearly with P2P fully distributed services.

DISTRIBUTED (THE BEST)

DECENTRALIZED

Please study the good comparison table: https://www.securemessagingapps.com/

But with the exception maybe of SESSION all of these well known services have at least one flaw and can not be operated anonymously AND secure. Many still want your (registered) phone number, or log or have other flaws, which could be intentional.)

Figure 1: The difference between encryption in transit and end-to-end encryption.

SERVERBASED (always vulnerable to be deplatformed - like it happened to PARLER.COM):

  • Ricochet -anonymous P2P instant messaging over TOR. Comes with the client integrated. Best Facebook alternative.
  • Gab - was and is best twitter alternative, but got hacked 01. March 2021! - and continues now more safe. Refused successfully to give access as demanded by the German government. Good alternative.
  • Parler - was deplatformed by Amazon but resurrected - it is however "owned".
  • Diaspora - more for for gamers and easy social groups - not the best tool for journalists or rights activists.
  • GETTR -  Old cloud hosters cloudfront & edgecastcdn were bought up by Amazon Cloudflare Services. Google's ReCaptcha is directly implemented into the GETTR API. If you put their mail address into Google, you literally find yourself in MossadLand in N.Y

    ⇢ Google will know exactly who uses and how they use the site

    ⇢ Gathered big data sold to 3rd parties as they wish (Ad Words)

Gettr is a Trojan Horse! You should ask yourself why Donal Trump and many of his followers are using Gab NOT Gettr!
https://www.youtube.com/watch?v=8WzPgAsB3xI
https://rumble.com/vsykk2-tim-pool-smashes-gettr-ceo-jason-miller-to-his-face-calls-fuentes-banning-b.html
https://rumble.com/vs2y0h-gettr-uses-twitter-censorship-tactics-globalist-funded-platform-bans-americ.html
https://twitter.com/HamEggsnSam/status/1484401732557881344

Some criticism concerning widely used so-called 'secure' messaging apps and why they are ruled out by people, who are serious about security.

One big problem they all have in common: They require the server of their maker-master, who is ultimately in control.

Those who are considered to be bad from the root and are implicated in or accused of giving customers' data to intelligence agencies - like Microsoft Skype, Facebook Messenger, Google Messages, Apple iMessage are not even worth to be discussed here. N.B.: the ranking below is only in terms of number of users worldwide. Dump Skype

1. WhatsApp - was acquired by FacistBook, which in itself is a U.S. spy operation. WhatsApp steals all you contact data. It doesn’t store your messages on its servers, but tries to lure you to back them up and store them onto their or google's insecure cloud (and whoever might be in there.) No anonymous sign-up - requires phone number.

2. Viber - Rakuten Viber is currently based in Luxembourg with servers in USA and the Viber software is proprietary - means can not be checked for backdoors. Does not encrypt all data. Does not provide transparency who runs it and collects user data. Is not really focused on privacy. Steals user contacts and hands over user data. Logs timestamped user IPs and locations. No 2FA. No anonymous sign-up - requires phone number.

3. LINE - insecure Japanese platform that requires to turn on the limited encryption of message data. The flaws are too many to list here. 

4. Telegram - requires to switch on “Secret Chats” to employ full end-to-end encryption. Is heavily monitored by governmental services especially in the dissident chat-groups. Engages paid influencers to lure people to sign up to Telegram. Telegram upon governmental request was able to find and then did disable/delete certain groups and users on their servers. The app is not recommended to secure users' messages and attachments. Does not provide the users' device fingerprint information to verify. App does not use TLS/Noise to encrypt network traffic. Company logs timestamps/IP addresses and the company's general stance on customers' privacy is rated as poor. No anonymous sign-up - requires phone number. Has become a networking tool for first network contacts to dissident groups and for undisturbed news dissemination, but don't use it for your actual and real life network. Establish contact on Telegram but then continue by other means. 

Telegram has some real privacy problems such as the telephone number verification, and routing communications through official Telegram servers in most cases. However, Telegram contains privacy features and claims to not collect any user information.

Telephone Number Required -Telegram features the more modern spyware feature that requires the user to associate their persistent user identity with a telephone number. This is obviously a breach of privacy, because Telegram requires the user to disclose this personal information.

Centralized communication routing - Telegram does not use peer-to-peer or private servers for the majority of its communications. This means that Telegram is capable of logging all of the communications you send through its service, unless you opt to only use the Peer-to-Peer features of Telegram. Centralized communication routing has a high potential to be spyware. Telegram attempts to use Peer-to-Peer communication for Voice Calls, but it may disclose IP address to the counterpart. Telegram claims in its privacy policy.[1] that it does not collect any information, but it is impossible to prove this.

Telegram's server software is closed source and Telegram does not distribute its server software. There is no way for other people to host their own Telegram services because of this, meaning that the servers that the developers operate are the only choice for using this messaging platform.

Telegram does not follow its GPLv2 Obligations -Telegram clients are advertised as free software, but in practice the source code is not immediately accessible, the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.

And last, but not least: Telegram is among the worst cross-platform identifiers and trackers under the sun.

5. KakaoTalk has a huge user base, but mainly only in South-Korea. Default chat mode is not end-to-end encrypted. No anonymous sign-up - requires phone number.

6. Signal – Private Messenger. Whisper Systems created Signal, but it is now owned by Twitter and financed by WhatsApp co-founder Brian Acton. You get it from Google Play or App Store and from there the trail to you starts. Not all personal information (mobile number, contact list, etc.) is hashed. You can add a contact only by trusting a directory server. Encrypts user data on the phone only if passphrase is enabled. No anonymous sign-up - requires valid phone number. WhatsApp and thereby Meta (Fascistbok's Zuckerberg) as well as Google (gmail) infiltrate now your Signal installation right from the start. Signal now cross-references with Whatsapp and takes your contacts to the unregulated cloud. Signal is no longer a way to communicate securely.

7. Dust - Formerly known as Cyber Dust. Collects user information such as registration and account information (e.g., your phone number, username, password, email address, age, etc.), information from other sources, such as our third-party service providers, logs, other device information, and technical usage information. They use information collected from you and third parties and retain it for as long as they need it for their business. Tht says it al. No anonymous sign-up - requires phone number.

8. Threema - APIs and server code are proprietary and not open source. No perfect forward secrecy at the end-to-end encryption layer. No comprehensive independent assessments of security/privacy. App encrypts data on the device only if Masterkey or Passphrase are enabled. Directory service could be modified to enable a MITM attack. “Private Chats” feature requires activation with additional PIN code. No self-destructing messages. Anonymous sign-up is possible, BUT you have to purchase the app, and from there the trails, association and tracking starts.

9. Wickr / Wickr Me – Secure Messenger - Proprietary, closed source. The app is not recommended to secure users' messages and attachments. You cannot add a contact without needing to trust a directory server. Directory service could be modified to enable a MITM attack. Reproducible builds are not used to verify apps against source code. Anonymous sign-up is possible, BUT this app is not open source and nobody knows if there are backdoors. There is also a free service for video conferences, but with limited storage, only up to 10 registered users (no unregistered people joining), up to 30 days data retention - especially the last point says it all.

11. CoverMe - Needs purchase before you even verify if the app works! Some call it a scam.

12. Silence - Formerly known as SMSecure uses encrypted SMS messages with no Internet connection required. Because Silence is a SMS/MMS application, your carrier may charge you for sent SMS/MMS messages if your plan doesn’t include unlimited messages. To start a secure session, Silence must be installed on both sides. You can still chat with your friends that do not have Silence installed, but this will be via unencrypted messages, like any other SMS/MMS app. Download doesn't require anything, BUT, since the phone number is not obfuscated - people using it are known and also the other transmitted metadata can be accessed by surveillance.

13. Pryvate Now - is clearly business oriented. No anonymous sign-up 

14. SureSpot - openly and transparently explains where problems are in their own threat analysis.

15. Wire - Via the app the Wire server collects contact info, identifiers, usage data, diagnostics. No permanent free account offered, tracking and association start with the payment process. Server keeps metadata in storage and does logging. User data and/or metadata are sent to parent company and/or third parties. No reproducible builds used to verify apps against source code. Directory service could be modified to enable a MITM attack. No contact can be added without needing to trust a directory server. No anonymous sign-up.

16. Keybase was designed to make public key cryptography more accessible to regular people. Used properly, public key cryptography can eliminate most of the problems we have with hackers and unwanted government surveillance of the Internet. However, it is now owned by Zoom with deep ties to China (privacy concerns), rather complicated to install (for Windows only on machines with 64bit processor), not easy to configure and often confusing for regular users. Server code is not open source. https://restoreprivacy.com/secure-encrypted-messaging-apps/keybase/

There are many other alternatives to Fascistbook without censorship (like e.g. https://streetloc.com/ - with Russian affiliation but has international news content). However, at the end you have to decide for yourself. Read at least their terms before signing up.

Ayone with verifiable information for add-ons to the above list or about changes that are not yet reflected please feel more than welcome to let us know by e-mail to  

Conclusion

We’re living in a digital world where security and privacy matter more than ever. If you are concerned about your data safety and value privacy, then it’s a must to use only one of the best encryption messaging apps from distributed service apps like Tox, Briar or Session to secure your communications and to keep spies, hackers or any other malicious actors out.

READ ALSO: Do You Want to Chat? Think twice!

E-Mail (web/server-based)

Due to the nature of how E-mail works, your e-mail providers and Internet service providers (ISPs) will always know to which address you send messages and from whom you receive messages (MetaData). Use anonymous username alias and web-based services via VPN and relatively secure browsers like Brave Browser (now also for Windows 32-bit devices) or Epic (with own VPN - though they started as of 23. May 2021 that users would have to subscribe and PAY for using their search function - what a stupidity!), or even still Firefox (with add-ons) or better straight TOR or Palemoon Browser or GNU IceCat (select the best browser for you from HERE)

  • CTemplar or "Crypto Templar": Encrypted e-mail service on Iceland. (Currently the best, secure e-mail provider, requires invite for free account). In that it is similar to
  • Riseup.net , where one needs two recommendations to participate. Trusted, longstanding group in Canada, whose one server in the USA once got raided without damage for the users. 
  • Disroot.org in the Netherlands is a similar non-profit that has developed into a strong platform (see below). 2GB free space
  • Protonmail: Encrypted e-mail service plus free VPN that is mainly based in Switzerland (with good laws but intransigent procedures). The service was invaded by authorities based on a court order and a demand from France to get the data and logs of an account allegedy belonging to a person under terrorism charges. They couldn't get content, but the logs and meta-data wer sufficient to prosecute the accused, who had not used a VPN. Protonmail nowadays lures free account holders who use the desktop, to install their app also on the mobile phone, which might be convenient but will break the anonymity of users. Free account 500 MB space.

BEWARE

  • Abine Blur: - Abine, the company behind the Blur password manager and the DeleteMe online privacy protection service, revealed on 13. December 2018 a data breach impacting nearly 2.4 million Blur users by revealing their addresses and persona data. Service is Boston (USA) based. 
  • Tutanota: Encrypted e-mail service (based in Germany, where the powers of the spooks just have been increased dramatically). Might not work on secure or every browser. Free account 1 GB space. CAVEAT: The Germany-based (under U.S. command) Tutanota team has now engaged in strange activities by deleting free-mail accounts (for allegedly not checking the account often enough) and to offer recovery of the address (not the 'deleted' content) only against subscription for a paid account - that's coercion. In addition it steals emails from Gmail app on the same phone, if the user is not careful enough. From June to November 2019 Tutanota had to built a surveillance tool into their system and followed this police demand without informing their customers. Again since November 2020 that surveillance system was reinstalled and allows the German authorities and their spooks to read the encrypted e-mails of Tutanota clients.

BETTER SOLUTION:

  • Host your own: This is a document describing how to host your own E-Mail service at home with minimal requirements. Requires a bit of knowledge and about 2h to set it up.

Most privacy concerned users forgot about hushmail since long, had to forget about Lavabit after they were invaded and now forget about Startmail, Fastmail, Tutanota or other services based in USA, Germany, France, UK, Australia or similar jurisdictions, which are part of the attempt to establish a NWO global cyber-space dictatorship.

Any paid service is automaticaly not anonymous and, since also bitcoin transactions can be traced, they are thereby not safe for political dissidents, environmental activsts or journalists under threat.

Independent advise on e-mail services and VPNs in detail.

Learn how to encrypt your emails securely Email Self-Defense

Unsubscribe from newsletters that are sent to you via notorious bulk-email companies (like mailmonkey) who build into the mails their own trackers and other snooping devices. Check each link in an e-mail you receive and if you see in the link-address more than just the straight URL then you know you are being tracked with that e-mail and your interest (expressed by clicking on that spiked link) is build into a profile that is traded among BigTech. Tell the sender that they must be nuts and unsubscribe.

OWN WEBSITE

CAVEAT: By creating your own website on the Internet you draw attention to yourself. That can be very helpful, if you need to inform and alert the world and/or seek support in your struggle. But beware, it is a two way road and with the enhanced visibility you might call also for the attention of your enemies. Especially Indigenous communities must jointly decide, if they better live and remain without that focus or if they need to become visible also on the internet in order to not be terminated without trace. Unfortunately in 2022 the world and its Internet have become a very dangerous place.

Before you buy a domain name and pay for web hosting, start by creating a free website for yourself.

Create your own free website

Neocities is a social network of 414,400 web sites that are bringing back the lost individual creativity of the web. We offer free static web hosting and tools that allow you to create your own web site. Unlimited creativity, zero ads.

Unlike others Neocities will never sell your personal data or put advertising on your site. Their platform is Open Source and they publish the code that powers the site for inspection. They promise to not lock you in and force 100% strong SSL on all sites as well as full support for HTTP/2.

Good Advise: Discuss among your peers, which the best domain name for your future registered domain shall be (check availability), but do not use that very name for your first free website, otherwise squatters might grab that domain and later, when you then need it, they will only sell it to you expensively). If you have for example a genuine name for your people in its correct spelling, which would also be protected by intellectual property and other rights, it might be avised to register just the domain as fast as possibleI - to secure it (its around 12.-USD per year for a top level .org domain with a secure domain registrar). If you need advise how to do that best write to Friends of People close to Nature (fPcN-interCultural) via [best from a free protonmail e-mail account you create now for yourself] . 

File sharing

File sharing over TOX or BRIAR is quite secure.

Other services are:

  • ONIONSHARE
  • Tixati: A free Torrent client written from scratch. It has additional features like support for live streaming media.
  • Syncthing: This is meant as a Dropbox replacement for your own sync but nothing stops you from sharing directories with others.
  • Fopnu: Best described as a LimeWire successor.
  • Disroot.org has a good file sharing option

GROUP WORK

  • https://freedomcells.org/ (Freedom Cells are peer to peer groups organizing themselves in a decentralized manner with the collective goal of asserting the sovereignty of group members through peaceful resistance and the creation of alternative institutions. Communications are p2p-encrypted). Read also: What Is Security Culture?
  • and it's interesting fork https://freetofindtruth.com
  • https://brax.me - Social community with users are focused on privacy. No Identity. Encrypted. Open Source. App runs on iOS, Android, and any browser. This means it runs universally on any computing platform, mobile or desktop. If you want to install Brax.Me on an Android without a store, the APK file is available here: Braxme.APK
  • Deltawelt (Austria) - lies: https://www.deltawelt.at/site/about

Encrypted storage

  • VeraCrypt: The successor of TrueCrypt.
  • 7-Zip: A free zip utility. You can use encrypted 7z archives as a portable storage across cloud drives.

---

PDFs

Instead of the  ADOBE spooks, you can use freely:

  • SumatraPDF (open source for Windows, comfortable, light, no-nonsense, multiple format READER)
  • Infinix (also to edit the pdf - free test version that places their logo as watermark on your edited copy)

===

Best alternatives for Windows (... it's still LINUX Ubuntu)

===

An interesting project is www.disroot.org , with its many apps:

 EMAIL   CHAT   CALL SCRYPTPAD SEARX PASTEBIN CLOUD ETHERPAD UPLOAD  CALC   POLLS MUMBLE FORUM    GIT   TAIGA

Beginner's Guide To Get Email Account At Disroot

Get the Disroot Android app on F-droid F-droid

===

Another new development since 2019 is https://delta.chat/en/

Delta Chat is an e-mail app that follows a strict privacy-by-design approach. All communication data remains on the end devices or on the e-mail servers selected by the user.

- since Delta Chat works now with disroot email (see above), Autistici/Inventati, riseup.net, aktivix.org or systemausfall.org etc. this could be an ideal solution for activists and journalists.

CAVEAT: Delta Chat uses Autocrypt as cryptographic protocol, which unfortunately is said to be much less secure than a trust on first use (TOFU) model and Man-in-the-middle attacks are not preventable in this security model, which is controversial. However and though it is not for life-or-death communications, it is better than open-postcard plain e-mail or most messengers and throws some spanners into the works of the spooks. 

Chat over e-mail and head back to the future ! 

Delta Chat is like Signal, Telegram or Whatsapp but without the tracking or central control. Delta Chat does not need your phone number. Check out their privacy statement.

Delta Chat doesn’t have their own servers but uses the most massive and diverse open messaging system ever: the existing e-mail server network.

Chat with anyone if you know their e-mail address, no need for them to install DeltaChat! All you need is a standard e-mail account.

The desktop versions do not require Delta Chat to be installed on a phone.

Minimal requirements: Android 4.1 Jelly Bean or iOS 11, iPhone 5s or iPad 5/Air/Mini or Windows 7 (solely 64bit), macOS 10.10 Yosemite, Ubuntu 12.04, Fedora 21 or Debian 8 or compatible systems.

End-to-end encryption by implementing Autocrypt and Verified groups. User-friendly end-to-end encryption means that the requirements of the GDPR are already implemented at the technical level, Privacy by Design.

No upload of contact lists from your phone.

All data is stored locally on your device or with your e-mail provider. Neither Delta Chat themselves or Delta Chat developers have any possibility to access the end user’s data, as all communication and data processing takes place on the end user’s device without Delta Chat servers being involved. Only for the optional Push Notification (see 2.2) the Push Notification Token is processed by Delta Chat servers without them having any knowledge about the messages themselves, not even in encrypted form.

===

A FUTURE OPTION

Qortal

The Qortal Network

Truly Decentralized

Community-Driven and Decentralized From The Hardware Layer Up, QORTAL’s Unique Egalitarian Minting Protocol & Distributed Leveling System Is Designed To Create A More Secure & Liberating Digital World.

JOIN THE NETWORK (unfortunately in WindowsOS only for 64bit devices)

Q-Chat

WORLD FIRST - COMPLETELY DECENTRALIZED REAL-TIME BLOCKCHAIN-BASED COMMUNICATIONS SYSTEM

Qortal Network launched with another of its world firsts… a completely decentralized communications system Q-Chat.

At the moment it utilizes text based chat only, however in the future there will be voice and video communications and screen share, so that it can fully replace other communications platforms such as slack.

Groups and group chats are also possible, BUT at the moment group chat is not fully encrypted, and is only base58 encoded. There will be full encryption in the future.

The Qortal network is designed to incentivize every user to run their own node on the network.  This is key for building a truly robust infrastructure that will outlive us all.

From data storage and web hosting to the voting system that will run the future of the platform, all development on QORTAL is driven by community consensus and easily applied to the network thanks to its unique auto-update feature.

===

IMPORTANT NOTICE:

- reflecting on the above listed Internet and communications security advisory.

In an ever more complex world your universally guaranteed right to privacy, your private communications with your family, your loved ones and friends and legit business partners as well as your legally guaranteed rights to confidentiality privileges with your medical doctor, attorney etc. are under serious threat or in many countries gone already.

As soon as there is a more secure way to communicate and to protect your rights, it is also used by criminals and then law enforcement entities feel they have the right to break in. Since 9/11 governments have via legislations empowered themselves to do just what they want - and these powers are abused left, right an centre. The level of electronic espionage targeting even close allies and friends within blocks of political associates is unprecedented.

Even more threatening it is in rogue countries, which have a governance that itself turned into an entity of organized crime and many transnational corporations also of BiG Tech already are nothing but a transboundary crime network. Legit political opposition, dissidents, human rights defenders but also enterprizes with new developments are targeted 24/7.

Legit companies with good products for secure communications like the initial hushmail (developed for patient doctor confidentiality) or the initial Lavabit and recently EncroChatSky ECC or Phantom Secure have been shut down by constant threats or attacks by so called law enforcement. 

While the real criminals, including criminal governments or corporations have all the money they need to still communicate safely with their own and unknown systems, except if they rely on honeypots set up by the predators, like it was the case with Anom, those who defend humanity and the values of the UN Carta are left vulnerable. Assassinations of human rights defenders, Indigenous peoples' leaders, environmental defenders leave a long blood trail that stains the hands of those who commit the crimes but also of those who sell the permeation tools to the attackers.

It is a never ending cat-and-mouse game, whereby we can only try to give you best advise but no ultimate guarantees that your communication still can be secure - except maybe, if you walk naked  on a stormy day with the person you need to talk to in private under the canopy of a dense forest, where no earth microphones are embedded.

Our beautiful world has developed into one very sick place.

=== 

Your "Smart"-phone is the SPY in your Pocket or next to YOU

How Your Phone Works! Tech Secrets

December 15th, 2021

Rob Braxman Tech

@RobBraxmanTech

How does a mobile phone work? What is the technology involved? Why do some phones not work for some carriers? Why can't Linux people easily build phones? What is the effect of China on phone security? Who can spy on the phone? And lots more.

I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)

https://brax.me/home/rob - Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise

https://bytzvpn.com - Premium VPN with Pi-Hole, Cloud-Based TOR Routing

https://whatthezuck.net - Cybersecurity Reference

https://brax.me - Privacy Focused Social Media - Open Source

Please follow me on Odysee! (Previously LBRY)
https://odysee.com/$/invite/@RobBraxmanTech:6

===

The 8 Best Linux Secure Phones for Privacy and Security

Privacy is one of the most important assets in human life. Here is a concise list of the most Linux secure phones for privacy in 2021.

https://www.ubuntupit.com/best-linux-secure-phones-for-privacy-and-security/

UbuntuPIT (https://www.ubuntupit.com/best-linux-secure-phones-for-privacy-and-security/)

===

4 Ways to Tell if Your Mobile is Infected with Pegasus or any other Malware

Look out for these warning signs of an infiltrated smartphone. Using the recently released toolkit should also be helpful in scanning your device for any malicious software.

4. Check for signs of battery drainage

Spyware can drain an excessive amount of battery from your device. See if your battery is depleting very quickly or that you find yourself needing to charge your phone often.

3. Check for encrypted text messages

Receiving strange SMS messages that look like code could be a worrisome sign that the device is hit with spyware. Beware of other texting scams like smishing that steal sensitive information from devices as well.

2. Check for high data usage

When your phone is hacked, the hacker is trying to extract data from your phone which means it needs a connection to transfer that data. Go to Settings then tap Connections. Select Data usage and then review your current amount of available data.

1. Use the Mobile Verification Toolkit

The MVT scans the device backup for text messages with links to domains known to be used by NSO as well as any potentially malicious applications installed on the device, Tech Crunch explained.

Here's what Israel’s NSO Group Pegasus #spyware can do- software they willingly sell to “vetted” parties. Graphics from @guardian This was recently found to work on iPhones as well by Amnesty International. pic.twitter.com/Y7Q3L7ixjD

— Mindful Vegan Canadian🇨🇦🧘‍♂️ (@mindfulvegan_ca) July 22, 2021

Read Also: Afraid Your Samsung Galaxy Phone Has Been Hacked? Check For Warning Signs, Perform Fixes

How to Use Amnesty's Mobile Verification Toolkit

The open-source toolkit can be downloaded from Github and is available for both Android and iOS users.

The Amnesty International Security Lab does inform the users that the tool does require some technical skills like understanding the basics of forensic analysis and using command line tools. Installation of the MVT does require the installation of dependencies that are compatible with the computer being used for the scans.

A more in-depth guide to using the tool is available in their documentation that walks the user step by step from installation to scanning.

The tool is not limited to scanning for Pegasus as it can also check for other malicious apps.


Related: Afraid Your iPhone Is Infected With Spyware? Major Warning Signs and 6 Ways You Can Remove It

===

With your "Smart"-phone you have been chipped already: MUST UNDERSTAND: WATCH THIS and WATCH THIS !

DON'T DO 2FA (two factor authentication) !  Sounds strange, because you were told it is for your safety? Here is why.

===

Preparing A Website For Web 3.0 Publication 
The First Step Towards Becoming Virtually Unstoppable
02. March 2021 - Much revised and simplified
HTML - PDF - ODT - IPFS

Direct To The World
Only On IPFS and LBRY

There are already web 3.0 sites from:

CorbettReport.com

FreedomsPhoenix.com

Highwire.com

IceAgeFarmer.com

RonPaulInstitute.org

RonPaulLibertyReport.com

NeoNetwork.in by Ramiro Romani

and others

---

Realize what FakeNews are: This Is What Mind Control Looks Like

---

Do NOT entrust YouTube with your important videos.

YouTube has become a serious and - as show in court cases - criminal censor with a battalion of minders.

YouTube alternatives:

Better upload to censorship free platforms:

BITCHUTE or BRIGHTEON or LBRY or to PrivacyTools PeerTube or BRANDNEWTUBE

or get further advise: YouTube Alternatives – 15 Best Video Sharing Sites Like YouTube - 2020

Top 10+ Sites like YouTube without Restrictions: YouTube Alternative - 2020

===

'Blocked In China' Tool

Want to know what websites are blocked in China?

GO HERE

Simply enter any URL and instantly see if the site or service is blocked by the Great Firewall of China. 

How does the 'Blocked in China' Tool work?

The blocked in China tool attempts to access any URL you provide from 5 different locations across mainland China. The results will be displayed for each server location along with an average result. The testing process can take up to 30 seconds to complete, but we cache the results for future users which means the tool will become faster with time.

Why does China block websites?

The impact of rapid economic development and increased cultural engagement with the rest of the world over the last 20 or so years has had a profound impact on Chinese society.

When it comes to matters of personal liberty and political freedom, however, the ruling Communist Party (in truth an inheritance-based oligarchy) maintains tight control over the information and exposure to “foreign” ideas that Chinese citizens are permitted to access. Or at least, it would like to…

The internet, however, in a country in which the standard of living is soaring after many years of deprivation and economic stagnation, is both insanely popular, and is central to China’s continued economic development. Given that it is also global phenomena that respects no national boundaries, this clearly represents a major threat to the Party’s reactionary social agenda.

So, which websites are blocked in China?

Everything Google

Most notable for being blocked in China are all of Google's services, including: Gmail, Google Drive, Google Search and YouTube.

This follows a dispute between Google and the Chinese government in 2009, involving accusations from Google that the Chinese government was complicit in cyber-attacks on Google websites.

The Chinese government, for its part, was annoyed by Google’s refusal to remove videos on YouTube that showed police beating protesters during riots in Tibet.

Social Media

In their effort to limit citizens exposure to "foreign ideals" the Chinese Government also block many popular social media apps, including: Facebook, Snapchat, Twitter, Instagram and Tumblr.

News websites

It's not hard to imagine why the Chinese Government would want to block access to western news sites. Some notable sites which are blocked include: BBC, New York Times, Reuters and Wall Street Journal.

Messaging and VOIP services

The citizens of China have also been denied access to many popular communication services by their Government, that are ubiquotusly enjoyed by many in the West. These include: Skype, Whatsapp, Viber and Facebook Messenger.

Other types of sites

In addition to these broad types of websites, the Chinese Government also endeavours to block access to other types as well including sites hosting pornographic material as well as VPN sites, designed to help users circumnavigate the Great Firewall of China.

How do I unblock websites in China?

If a website is blocked in China, it can often be unblocked with a Virtual Private Network (VPN). These are subscription-based services that proxy your internet connection over an encrypted connection.

unblock sites in China

Unfortunately, the Chinese government is all too aware that people use VPNs to evade its censorship regime, so the Great Firewall of China (GFW) also blocks many VPN services. But not all...

To find out more about how VPNs help unblock websites in China, please see our VPNs in China guide.

How do I find a VPN that works in China?

It just so happens that we have a list! Please see 5 Best VPNs for China, which we regularly update with the latest information as it available. It is important to note that the VPNs on that list only work because they all use special obfuscation techniques to evade detection by the GFW.

It is therefore vital that you enable XOR encryption in your VPN app, connect to special “stealth servers,” or do whatever extra steps are required to bypass China’s VPN blocks.These special obfuscation features are discussed in detail in each of our full VPN reviews.

What is the Great Firewall of China?

The GWF uses a range of technologies to “protect” Chinese citizens from content the Party deems inappropriate or dangerous for them to see. These technologies include simple IP blocks on website addresses. DNS filtering, URL filtering, packet filtering, and more, are also used.

In addition to these, Deep Packet Inspection techniques are used to foil attempts to bypass these blocks. If you are interested in learning about the censorship methods used by the GFW, an excellent discussion on the subject is available here.

The first phase of the GFW was completed in 2006, but it has since grown in complexity and scope. It now restricts internet access into and out of mainland China to only three access points. It also employs up to fifty thousand cyber-intelligence specialists to police the data-waves.

An important aspect of the Great Firewall is that it is deployed very unevenly. A website can be blocked in one province, but be available in the next.This is why our Blocked in China Tool tests website access in five separate locations around China.

===

Best free VPN inside China and elsewhere: Cat VPN

Cat VPNEasily Connect with all country VPN and Safer and lightning-fast VPN. 

Most of the mobile apps are exclusively developed to work with mobile phones. But we love to use them on larger screens such as Windows Laptop / Desktop as it gives easy and faster access than a small mobile device.  

Few apps provide the larger screen versions that support windows, mac, and PC by default. But when there is no official large screen support,  we need to find a way to install and use it. Luckily we have got you a few methods that can help you to install and use Cat VPN in Windows - 7/8/10, Mac, PC.

Download Cat VPN for PC   

Here we have listed a few different ways to Download Cat VPN on PC/Windows in a step-by-step guide. Try them out and enjoy Cat VPN on your PC. If you have any questions or face any issues, please let us know by posting in the comment section below.

Cat VPN Download for PC Windows 7/8/10 – Method 1:

In this first method, we will use Blustacks Emulator to install and use the mobile apps.  So here is a little detail about Bluestacks before we start using them.

BlueStacks is one of the earliest and most used emulators to run Android applications on your Windows PC. It supports a wide variety of computer and laptop versions including WIndows 7/8/10 Desktop / Laptop, Mac OS, etc. It runs apps smoother and faster compared to its competitors. So you should try this method first before trying other methods as it is easy, seamless, and smooth.

So let's see how to download Cat VPN for PC Windows 7/8/10 Laptop/Desktop and install it in this step-by-step method.

  1. Open Blustacks website by clicking this link - Download BlueStacks Emulator
  2. Once you open the website, you will find a green color "Download BlueStacks" button. Click it and it will start the download based on your OS.
  3. After the download is complete, please install it by double-clicking it. Installation is as simple and easy as any other software installation.
  4. Once the installation is complete, open the BlueStacks software. It may take some time to load for the first time. Just be patient until it completely loads and available. You will see the home screen of Bluestacks. 
  5. BlueStacks comes with Google play store pre-installed. On the home screen, double-click the Playstore icon to open it.
  6. Now you can search Google Play store for Cat VPN app using the search bar at the top.  Click "Install" to get it installed. Always make sure you download the official app only by verifying the developer's name. In this case, it is "Wost App".
  7. Once the installation is over, you will find the Cat VPN app under the "Apps" menu of BlueStacks. Double-click the app icon to open and use the Cat VPN in your favorite Windows PC or Mac.

Cat VPN Download for PC Windows 7/8/10 – Method 2:

If the above method doesn't work for you for some reason, then you can try this method - 2.In this method, we use the MEmuplay emulator to install Cat VPN on your Windows / Mac PC.

MemuPlay is simple and easy-to-use software. It is very lightweight compared to Bluestacks. As it is designed for gaming purposes, you can play high-end games like Freefire, PUBG, Temple Run, etc.

  1. Open Memuplay website by clicking this link - Download Memuplay Emulator
  2. Once you open the website, you will find a big "Download" button. Click it and it will start the download based on your OS.
  3. After the download is complete, please install it by double-clicking it. Installation is as simple and easy as any other software installation.
  4. Once the installation is complete, open the Memuplay software. It may take some time to load for the first time. Just be patient until it completely loads and available.
  5. Memuplay also comes with Google play store pre-installed. On the home screen, double-click the Playstore icon to open it.
  6. Now you can search Google Play store for Cat VPN app using the search bar at the top.  Click "Install" to get it installed. Always make sure you download the official app only by verifying the developer's name. In this case, it is "Wost App".
  7. Once the installation is over, you will find the Cat VPN app under the "Apps" menu of Memuplay. Double-click the app icon to open and use the Cat VPN in your favorite Windows PC or Mac.

Source

===

For German speaking users:

Hier findet ihr alles nötige um eure digitale Privatsphäre und persönliche Freiheit zu schützen ;)

https://www.kontrollausschluss.de/vorwort.html -
https://prism-break.org/de/ -
https://newblood.anonops.com/de/ -

===

NOTICE:

As you most likely noticed we do not open this site to comments or forum posts, because we need to protect it. If you have something important to contribute, send it to . Likewise concerning other fora you might visit, please know:

"The Gentlemen's guide to forum spies"

Know your enemies by what they post and how it is posted.

Technique #1 - 'FORUM SLIDING'

If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by 'forum sliding.' In this technique a number of unrelated posts are quietly pre-positioned on the forum and allowed to 'age.' Each of these misdirecting forum postings can then be called upon at will to trigger a 'forum slide.' The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a 'forum slide' and 'flush' the critical post out of public view it is simply a matter of logging into each account both real and fake and then 'replying' to pre-positioned postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting 'slides' down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and un-useful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 - 'CONSENSUS CRACKING'

A second highly effective technique is 'consensus cracking.' To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favor is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favor is slowly 'seeded in.' Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'

Technique #3 - 'TOPIC DILUTION'

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a 'RESOURCE BURN.' By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a 'gossip mode.' In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to 'drive in the wedge.' By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 - 'INFORMATION COLLECTION'

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a 'show you mine show me yours' posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your 'favorite weapon' and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favorite 'technique of operation.' From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 - 'ANGER TROLLING'

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes - without the requirement to 'stage' a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to 'lead' the forum by replying to your own posting with your own statement of violent intent, and that you 'do not care what the authorities think!!' inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 - 'GAINING FULL CONTROL'

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavorable postings - and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the 'ultimate victory' as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a 'honey pot' gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precedence to simply have the forum shut down and taken offline.

===

We are advocates of digital privacy and support that share our vision of a free and open internet, specializing in bringing secure communication especially to Indgenous peopes. We recommend also the following organisations:

Electronic Frontier Foundation Logo

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is a leading non-profit digital rights group made up of a vast network of leading technologists, activists, attorneys, and others across the globe, whose aim is to protect civil rights and liberties in the digital world.

Since its foundation in 1990, the EFF has fought for internet freedom for all, fiercely advocating the use of encryption, security research, file sharing tools, open source software, and other emerging technologies. Its passion and expertise has made it a mainstay in online rights debates, and the victor in a number of historic court battles.

The EFF empowers and enlightens thousands through their Action Center, educational guides, activist workshops, and more. It is always welcoming new members.

In their own words, the EFF “champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development.”

Visit EFF  »

Fight for the Future Logo

Fight for the Future

Fight for the Future is a non-profit organization whose mission is to ensure that the internet continues to be a safe place for freedom of speech, expression, and creativity. In addition, they seek to expand its transformative powers in order to make it an affordable and private space that both enriches and empowers users.

The group realizes their goals by putting together web-based campaigns that resonate with millions of people around the globe. Since Fight for the Future s foundation in 2011, they have organized a number of high profile protests, including the largest online protest in history, an internet-wide strike against web censorship that put an end to the SOPA and PIPA bills.

Fight for the Future firmly believes that public interest and protest can prevail over digital censorship, interference, and surveillance, even when up against some of the most powerful and entrenched political forces in the world.

Visit FFTF  »

Privacy International Logo

Privacy International

Privacy International is a non-profit group that is fiercely committed to fighting for people's privacy worldwide. They investigate government surveillance, expose companies that enable it, advocate laws that protect privacy, and call out those who overstep them—all with the goal of protecting the greater public and keeping them informed and engaged.

Privacy International envisions a world where privacy is a right that is universally respected and have worked towards it since 1990 by partnering with developing countries and working with international organizations that protect those who are most vulnerable.

Privacy International believes that privacy is an essential aspect of human autonomy and dignity that is becoming increasingly violated in this rapidly advancing technological world. They wish to turn this around by ensuring that legal and digital developments strengthen, instead of undermine, people's privacy.

Visit Privacy International  »

https://proprivacy.com/images/proprivacy-logo-divider.png ProPrivacy

 

ProPrivacy is the leading resource for digital freedom. Founded in 2013, the site’s mission is to help users around the world reclaim their right to privacy. ProPrivacy's aim is simple - to help users reclaim their right to privacy through research, reviews, knowledge-sharing, investigations and direct action.

VisitProPrivacy  »

===

THE ULTIMATE ADVISE

YOUR SMARTPHONE IS THE MOST DANGEROUS SPY IN YOUR LIFE

SECURING YOUR SMARTPHONE [15. November 2021] This is part 3 of Sean Gallagher’s advice for “securing your digital life.”

"If anything is free of charges on the internet, you most likely pay with your private and personal data." Data is the new Gold.

PORN HUB GIVES PEOPLE SO CALLED FREE PORN AND MAKES MILLIONS - THIS IS HOW THEY DO IT.

Re-published on BITCHUTE August 6th, 2021.

John McAfee Interview - Not so free after all he says

Now the outspoken inventor of the world's first AntiVirus-System was "suicided"

====

IMPORTANT LEGAL NOTICE
The information on our websites and reaching you via our disseminations is subject to a disclaimer and a copyright notice:

DISCLAIMER - ENGLISH

ECOTERRA Intl. maintains their websites and listservs to enhance public access to information about important news as well as ECOTERRA Intl. policies , initiatives and activities in general as well as concerning specific scientific subjects. Our goal is to keep this information timely and accurate. If errors are brought to our attention, we will try to correct them.

ECOTERRA Intl. does not accept any responsibility or liability whatsoever with regard to the material on their websites or disseminated via their listservs. This material is:

- information of a general nature only which is not intended to address the specific circumstances of any particular individual or entity;

- not necessarily comprehensive, complete, accurate or up to date;

- sometimes linked to external sites over which the ECOTERRA services have no control and for which ECOTERRA can not assume any responsibility;

- not professional or legal advice (if you need specific advice, you should always consult a suitably qualified professional, which can be provided by us, if you let us know your concern). Any information on health issues shall never be misconstrued as medical advice - see your licenced medical doctor or health practitioner.

Please note that it cannot be guaranteed that a document available on-line or sent via the Internet exactly reproduces an officially adopted text. ECOTERRA documents published in the paper editions of the official communications are deemed authentic.

It is our goal to minimise disruption caused by technical errors. However some data or information on our site may have been created or structured in files or formats which are not error-free and we cannot guarantee that our service will not be interrupted or otherwise affected by such problems. ECOTERRA accepts no responsibility with regard to such problems incurred as a result of using this site, any linked external sites or to receive and open our e-mails, though we scan them with the best available programmes to eliminate malware.

COPYRIGHT

© ECOTERRA Intl. 1972-2022

Reproduction is authorised, provided the source is acknowledged, save where otherwise stated.

Where prior permission must be obtained for the reproduction or use of textual and multimedia information (sound, images, software, etc.), such permission shall cancel the abovementioned general permission and indicate clearly any restrictions on use. Please respect especially the rights of Indigenous people, who gave us the right to show their faces in a specific context, but do not want their pictures to appear elsewhere. We have to enforce that they do not consent others to use their pictures.

Reprinted articles are shared under the Fair Use Law: Doctrine of International Copyright Law. http://www4.law.cornell.edu/uscode/17/107.html

NOTICE: Fair Use Copyright Law "Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use."

We have the right to freedom of opinion and expression; this right includes the freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Art. 19 UN-UDHR

With reference to any queries from the USA, we refer to the First Amendment of the U.S. Constitution and the EXECUTIVE ORDER on Preventing Online Censorship of May 28, 2020.

All our voluntary and non-commercial work with this website is based on the universally guaranteed rights to FREEDOM OF INFORMATION and FREEDOM OF EXPRESSION (Universal Declaration of Human Rights) as well as The International Covenant on Civil and Political Rights - ICCPR

Please address ECOTERRA Intl. via in case of any queries and NOT any of our other nodes or offices, since they are not responsible for this site.

---

Unrecht ertragen ist vielleicht eine noch verwerflichere Eigenschaft als Unrecht zufügen." 

Prentice Mulford

===

HAFTUNGSAUSSCHLUSS - DEUTSCH

Unsere Webseiten und Aussendungen sollen den Zugang der Öffentlichkeit zu wichtigen Informationen vereinfachen und ermöglichen sowie über die Ziele, Initiativen und Aktivitäten von ECOTERRA Intl. im Allgemeinen und zu speziellen wissenschaftlichen Erkenntnissen informieren. Ziel ist die Verbreitung genauer und aktueller Information. Wenn wir Kenntnis über Irrtümer erhalten, werden wir versuchen diese umgehend zu berichtigen.

ECOTERRA übernimmt jedoch keine Verantwortung für den Inhalt dieser Website.

Dieser Inhalt umfasst:

- ausschließlich Informationen allgemeiner oder spezieller Art, die dem Erkenntnisgewinn und der Fortbildung dienen;

- nicht unbedingt vollständige, ausführliche, genaue oder aktuelle Informationen;

- unter Umständen Links zu fremden Webseiten, auf deren Inhalt ECOTERRA keinen Einfluss hat und für die wir keine Verantwortung übernehmen;

- keine professionelle medizinische oder rechtliche Beratung (für eine solche sollten Sie immer einen zugelassenen Arzt oder Sachverständigen zurate ziehen, den wir Ihnen gerne vermitteln, wenn Sie uns Ihr Anliegen mitteilen).

Wir können nicht gewährleisten, dass die online abrufbare Fassung eines Dokuments genau dem offiziellen Text entspricht. Nur die per Papier-Dokument von uns übermittelte Kommunikation und Information ist verbindlich.

Wir möchten technische Störungen möglichst vermeiden. Für durch nicht fehlerfrei angelegte Dateien oder nicht fehlerfrei strukturierte Formate bedingte Unterbrechungen oder anderweitige Computer- und/oder Software-bedingte Störungen können wir keine Gewähr übernehmen. ECOTERRA übernimmt für derartige Störungen beim Aufsuchen dieser Website und deren Links zu fremden Websites sowie die Aussendung und den Empfang sowie das Öffnen elektronischer Mail keine Verantwortung.

URHEBERRECHTSSCHUTZ

© ECOTERRA Intl. 1972-2022

Die Wiedergabe mit Quellenangabe ist vorbehaltlich anderslautender Bestimmungen gestattet.

Ist für die Wiedergabe bestimmter Text- und Multimedia-Daten (Ton, Bilder, Programme usw.) eine vorherige Genehmigung einzuholen, so hebt diese die obenstehende allgemeine Genehmigung auf; auf etwaige Nutzungseinschränkungen wird deutlich hingewiesen.

Die Inhalte von Artikeln werden unter den Nutzungsbestimmungen des Gesetzes über gerechte Nutzung mitgeteilt - siehe Doctrine of International Copyright Law. http://www4.law.cornell.edu/uscode/17/107.html und sie dient der nicht-kommerziellen Verbreitung von Informationen sowie der Weiterbildung. 

Das Zitierten von Texten und journalistischen Artikeln auf dieser Webseite ist vom Zitatrecht § 51 des Deutschen UrhG gedeckt. Es existiert jeweils ein gut begründeter Zweck der Verwendung der Zitate. Darüberhinaus dient die nicht-kommerzielle und grundsätzlich als Zitat zu sehende Zweit-Veröffentlichung guter journalistischer Artikel auch der Förderung der verfassenden Journalisten durch Bekanntermachen ihrer Arbeiten und schützt vor Zensur.

Online-Streitbeilegung gemäß Art. 14 Abs. 1 ODR-VO:
Die Europäische Kommission stellt eine Plattform zur Online-Streitbeilegung (OS) bereit, die Sie unter http://ec.europa.eu/consumers/odr/ finden. Darüber hinaus nimmt unsere Organisation an einem Verbraucherstreitigkeitsverfahren nicht teil.

Haftung für Inhalte:
Die auf den Web-Seiten abrufbaren Beiträge dienen nur der allgemeinen Information und nicht der Beratung in konkreten Fällen. Wir sind bemüht, für die Richtigkeit und Aktualität aller auf der Website enthaltenen Informationen und Daten gemäß § 7 Abs.1 TMG zu sorgen. Für die Korrektheit, die Vollständigkeit, die Aktualität oder Qualität der bereitgestellten Informationen und Daten wird jedoch keine Gewähr nach § 8 bis 10 TMG übernommen. Die Haftung für den Inhalt der abrufbaren Informationen wird ausgeschlossen, soweit es sich nicht um vorsätzliche oder grob fahrlässige Falschinformation handelt. Verpflichtungen zur Entfernung oder Sperrung der Nutzung von Informationen nach den allgemeinen Gesetzen bleiben hiervon unberührt. Eine diesbezügliche Haftung ist jedoch erst ab dem Zeitpunkt der Kenntnis einer konkreten Rechtsverletzung möglich. Bei Bekanntwerden von entsprechenden Rechtsverletzungen werden wir diese Inhalte umgehend entfernen. Bereitgestellte Informationn dienen der staatsbürgerlichen Aufklärung, der Abwehr verfassungswidriger Bestrebungen, der Kunst oder der Wissenschaft, der Forschung oder der Lehre, der Berichterstattung über Vorgänge des Zeitgeschehens oder der Geschichte oder ähnlichen Zwecken dient.

Haftung für Links:
Wir sind für den Inhalt von Webseiten, die über einen Hyperlink erreicht werden, nicht verantwortlich. Für den Inhalt der verlinkten Seiten sind ausschließlich deren Betreiber verantwortlich. Wir machen uns die Inhalte dieser Internetseiten ausdrücklich nicht zu eigen und können deshalb für die inhaltliche Korrektheit, Vollständigkeit und Verfügbarkeit keine Gewähr leisten. Wir haben bei der erstmaligen Verknüpfung zwar den fremden Inhalt daraufhin überprüft, ob durch ihn eine mögliche zivilrechtliche oder strafrechtliche Verantwortlichkeit ausgelöst wird; wir sind aber nicht dazu verpflichtet, die Inhalte, auf die wir mit unserem Angebot verweisen, ständig auf Veränderungen zu überprüfen, die eine Verantwortlichkeit neu begründen könnten. Erst wenn wir feststellen oder von anderen darauf hingewiesen werden, dass ein konkretes Angebot, zu dem wir einen Link bereitgestellt haben, eine zivil- oder strafrechtliche Verantwortlichkeit auslöst, werden wir den Verweis auf dieses Angebot aufheben, soweit uns dies technisch möglich und zumutbar ist

Urheberrecht:
Die durch den Betreiber dieser Seite erstellten Inhalte und Werke auf diesen Webseiten unterliegen dem deutschen Urheberrecht nur wenn sie zuvor im Geltungsbereich des deutschn Urheberrechts veroffentlicht wurden. Sämtliche Beiträge Dritter sind als solche gekennzeichnet. Kopien von diesen Seiten sind nur für den privaten Bereich gestattet, nicht jedoch für kommerzielle Zwecke.

Abmahnungen:
Wir freuen uns über jeden Hinweis, wie wir den Schutz personenbezogener Daten oder die Erklärung zum Schutz personenbezogener Daten verbessern können. Die Inhalte unserer Seiten wurden mit größter Sorgfalt erstellt. Für die Richtigkeit, Vollständigkeit und Aktualität der Inhalte können wir jedoch keine Gewähr übernehmen. Als Dienstanbieter sind wir gemäß § 7 Abs.1 TMG für eigene Inhalte auf diesen Seiten nach den allgemeinen Gesetzen verantwortlich, wenn diese von ECOTERRA e.V. erstellt wurden. Nach §§ 8 bis 10 TMG sind wir als Dienstanbieter jedoch nicht verpflichtet, übermittelte oder gespeicherte fremde Informationen zu überwachen oder nach Umständen zu forschen, die auf eine rechtswidrige Tätigkeit hinweisen. Verpflichtungen zur Entfernung oder Sperrung der Nutzung von Informationen nach den allgemeinen Gesetzen bleiben hiervon unberührt. Eine diesbezügliche Haftung ist jedoch erst ab dem Zeitpunkt der Kenntnis einer konkreten Rechtsverletzung möglich. Bei Bekanntwerden von entsprechenden Rechtsverletzungen werden wir diese Inhalte umgehend entfernen.

Keine Abmahnung ohne vorherigen Kontakt!
Wenn wir gesetzliche Bestimmungen verletzen, so bitten wir um entsprechende Benachrichtigung ohne Kostennote addressiert an ECOTERRA Intl. via , unsere Vertretung in der BRD ist nicht fuer die Seite verantwortlich.
Es wird garantiert, dass zu Recht beanstandete Mängel sofort und unverzüglich behoben werden, so dass von Ihrer Seite die Einschaltung eines Rechtsbeistandes entbehrlich ist.
Sollte dennoch entgegen dieser Bestimmung ohne vorherige Kontaktaufnahme eine Rechtsvertretung beauftragt oder betrieben werden, werden die dadurch ausgelösten Kosten von uns in vollem Umfang zurückgewiesen. Wir behalten uns gegebenenfalls auch das Recht der Gegenklage aufgrund der Verletzung vorgenannter Bestimmungen vor. Wir berufen uns hierbei auf: § 8 Abs. 4 UWG sowie bei allen Streitfragen auf § 226 BGB! Bei Verdacht auf Missbrauch der wettbewerbsrechtlichen Abmahnung erfolgt zudem eine sofortige Mitteilung an die IHK und eine Veröffentlichung des Sachverhaltes mit den Verdachtshinweisen und Namen der Beteiligten.

Wir verbreiten keine FakeNews, haben eine excellente Reputation nur geprüfte Information zu verbreiten und sehen auch bestimmte sogenannte oder selbst-ernannte 'Fact-Checkers' sehr kritisch - siehe:

Wer die Bekämpfung von "Fake-News" finanziert

THINK FREE - THINK FOR YOURSELF

Datenschutz

Die Betreiber dieser Seiten nehmen den Schutz Ihrer persönlichen Daten sehr ernst. Wir behandeln Ihre personenbezogenen Daten vertraulich und entsprechend den gesetzlichen Datenschutzvorschriften sowie dieser Datenschutzerklärung.

Die Nutzung unserer Webseite ist in der Regel ohne Angabe personenbezogener Daten möglich. Soweit auf unseren Seiten personenbezogene Daten (beispielsweise Name oder E-Mail-Adressen von mitarbeitenden Autoren oder Subscribern) erhoben werden, erfolgt dies, soweit möglich, stets auf freiwilliger Basis. Diese Daten werden ohne Ihre ausdrückliche Zustimmung nicht an Dritte weitergegeben.

Wir weisen darauf hin, dass die Datenübertragung im Internet (z.B. bei der Kommunikation per E-Mail) Sicherheitslücken aufweisen kann. Ein lückenloser Schutz der Daten vor dem Zugriff durch Dritte ist nicht möglich.

Widerspruch Werbe-Mails

Der Nutzung unserer veröffentlichten Kontaktdaten zur Übersendung von nicht ausdrücklich angeforderter Werbung wird hiermit widersprochen. Die Betreiber der Seiten behalten sich ausdrücklich rechtliche Schritte vor - besonders im Falle der unverlangten Zusendung von Werbeinformationen, etwa durch Spam-E-Mails.

Auskunft, Löschung, Sperrung

Sie können unentgeltliche Auskunft über Ihre gespeicherten personenbezogenen Daten und den Zweck der Datenverarbeitung und haben ein Recht auf Berichtigung, Sperrung oder Löschung dieser von Ihnen eingegebenen Daten. Hierzu sowie zu weiteren Fragen zum Thema personenbezogene Daten können Sie sich jederzeit via an uns wenden.

Cookies

Internetseiten verwenden teilweise so genannte Cookies. Cookies richten auf Ihrem Rechner keinen Schaden an und enthalten keine Viren. Cookies dienen dazu, unser Angebot nutzerfreundlicher, effektiver und sicherer zu machen. Cookies sind kleine Textdateien, die auf Ihrem Rechner abgelegt werden und die Ihr Browser speichert. Wir selbst setzen keine eigenen cookies, aber Dritte - z.B. der angebotene Übersetzungsdienst -  benutzt cookies.

Die meisten dieser Cookies von Dritten sind so genannte „Session-Cookies“. Sie werden nach Ende Ihres Besuchs automatisch gelöscht. Andere Cookies bleiben auf Ihrem Endgerät gespeichert, bis Sie diese löschen. 

Sie können Ihren Browser so einstellen, dass Sie über das Setzen von Cookies informiert werden und Cookies nur im Einzelfall erlauben, die Annahme von Cookies für bestimmte Fälle oder generell ausschließen sowie das automatische Löschen der Cookies beim Schließen des Browser aktivieren. Bei der vollständigen Deaktivierung von Cookies kann die bestimmter Segmente eingeschränkt sein.

Server-Log-Files

Der Server dieser Seiten erhebt und speichert automatisch Informationen in so genannten Server-Log Files, die Ihr Browser automatisch an uns übermittelt. Dies sind:

  • Browsertyp/ Browserversion
  • verwendetes Betriebssystem
  • Referrer URL
  • Hostname des zugreifenden Rechners
  • Uhrzeit der Serveranfrage

Diese Daten sind nicht bestimmten Personen zuordenbar. Eine Zusammenführung dieser Daten mit anderen Datenquellen wird nicht vorgenommen. Eine Analyse der Besucher unserer Seiten wird nicht durchgeführt. Wir behalten uns aber vor, diese Daten nachträglich zu prüfen, wenn uns konkrete Anhaltspunkte für eine rechtswidrige Nutzung  z.B. einen Angriff bekannt werden.

This site is offered under

Creative Commons Attribution 3.0 License.

It’s okay to republish anything as long as original attribution bio is included and all links remain intact