A curated list of tools, services, and organizations for the folks who want to go further — bookmark this page and come back to it.
You made it through the guide. Here’s everything worth bookmarking — tools you’ll actually use, organizations doing real work, and services that fill the gaps this guide leaves. Digital privacy is not a one-time task. Return to these resources periodically.
Identity & Credit Protection
| Resource |
URL |
Purpose |
| Annual Credit Report |
annualcreditreport.com |
Free credit reports from all three bureaus — federally mandated |
| FTC Identity Theft |
identitytheft.gov |
Official FTC recovery tool — generates a personal plan for your situation |
| Have I Been Pwned |
haveibeenpwned.com |
Check if your email appears in known data breaches |
| Equifax |
equifax.com |
Credit bureau — fraud alerts, credit freezes, monitoring |
| Experian |
experian.com |
Credit bureau — fraud alerts, credit freezes, monitoring |
| TransUnion |
transunion.com |
Credit bureau — fraud alerts, credit freezes, monitoring |
Start here if something has already gone wrong. Have I Been Pwned and identitytheft.gov are the two most useful tools on this page.
Privacy Tools
| Resource |
URL |
Purpose |
| Privacy Badger |
privacybadger.org |
Browser extension — blocks invisible trackers automatically |
| uBlock Origin |
ublockorigin.com |
Browser extension — the gold standard for ad and tracker blocking |
| EFF Cover Your Tracks |
coveryourtracks.eff.org |
Tests your browser’s tracking protection — see how exposed you actually are |
| SimpleLogin |
simplelogin.io |
Email alias service — hide your real email when registering |
| Tor Browser |
torproject.org |
Anonymous browsing via the Tor network |
| DuckDuckGo |
duckduckgo.com |
Privacy-respecting search engine — no tracking, no ad profiles |
VPN Services
| Resource |
URL |
Notes |
| Proton VPN |
protonvpn.com |
Swiss-based, open source, independently audited no-log policy; free tier available |
| NordVPN |
nordvpn.com |
Established provider with strong security features including Threat Protection and Dark Web Monitor |
| Surfshark |
surfshark.com |
Unlimited simultaneous connections; includes Alternative ID and Alert features |
Password & Authentication
| Resource |
URL |
Purpose |
| Bitwarden |
bitwarden.com |
Open-source password manager — free tier is fully functional, self-hosting available |
| 1Password |
1password.com |
Premium password manager — Travel Mode, Watchtower, strong UX |
| Keeper |
keepersecurity.com |
Enterprise-grade password manager with BreachWatch and secure file storage |
| Authy |
authy.com |
Two-factor authentication app — backs up your 2FA tokens |
| Aegis Authenticator |
getaegis.app |
Open-source Android 2FA app — local storage, no cloud dependency |
Reporting & Legal
| Resource |
URL |
Purpose |
| FTC Report Fraud |
reportfraud.ftc.gov |
Report identity theft, scams, and fraud to the FTC |
| IC3 (FBI) |
ic3.gov |
FBI’s Internet Crime Complaint Center — report cybercrime |
| CISA |
cisa.gov |
US Cybersecurity & Infrastructure Security Agency — advisories and alerts |
| IRS Identity Protection |
irs.gov/identity-theft-central |
IRS resources for tax identity theft and IP PIN enrollment |
| NCMEC CyberTipline |
missingkids.org |
Report child exploitation online |
| APWG Phishing Report |
reportphishing@apwg.org |
Forward phishing emails here |
Privacy Information & Education
| Resource |
URL |
Purpose |
| Electronic Frontier Foundation |
eff.org |
Digital rights organization — privacy guides and legal advocacy for peons everywhere |
| Privacy Rights Clearinghouse |
privacyrights.org |
Consumer privacy resources and data breach database |
| Krebs on Security |
krebsonsecurity.com |
Cybersecurity journalism — breach coverage and real analysis |
| Troy Hunt’s Blog |
troyhunt.com |
Security researcher, creator of Have I Been Pwned |
| OWASP |
owasp.org |
Open Web Application Security Project — security standards |
| ConnectSafely |
connectsafely.org |
Family internet safety guides for every major platform |
EFF and ConnectSafely are ongoing education resources, not one-time reads. The landscape changes. Check back.
Data Removal Services
These are paid services. Manual opt-outs (covered in the Data Aggregator Opt-Out and People Search Opt-Out sections) are free but require your time. These services automate ongoing removal if you’d rather not do it manually every 6–12 months.
| Resource |
URL |
Notes |
| DeleteMe |
joindeleteme.com |
Automated removal from data broker sites; ongoing monitoring |
| Kanary |
thekanary.com |
Ongoing data broker monitoring and removal |
| Onerep |
onerep.com |
Automated removal from people search sites |
Digital privacy is not a one-time task. Settings change. Platforms update their defaults. Breaches happen. The noided approach is to check in periodically — not obsessively, but regularly. Set a reminder. Come back to this guide in six months.