Technologies

 

Protecting your digital rights online often requires the use of privacy-protecting technologies. While the Colorado EFA doesn't endorse these organizations and products, we want to you with useful information that supports our belief in protecting your rights.

 

Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG).

 

HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure.

 

Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. If an advertiser seems to be tracking you across multiple websites without your permission, Privacy Badger automatically blocks that advertiser from loading any more content in your browser. To the advertiser, it's like you suddenly disappeared.

 

The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.

 

The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.

 

 

 

Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity

 

 

 

 

Take back your privacy! Switch to the search engine that doesn't track you.

 

Ghostery empowers consumers and businesses globally to create safer, faster, and more trusted digital experiences. Millions of consumers rely on the free Ghostery Browser Extension and mobile app to control how they are tracked online. Businesses rely on Ghostery MCM to speed up, clean up, and lock down their websites and apps through increased visibility and control of the digital technologies used to drive conversion and revenue. Ghostery is also the dominant provider of privacy governance services, powering compliance for more than $2 billion of advertising and e-commerce transactions annually.