Resources

Our resources list provides valuable tools and insights to enhance your digital security and privacy. These resources include guides, products, and best practices developed by our team and our friends at Grey Dynamics. We are not affiliated with any of the companies listed. We do not get commission. We simply list the products and services that we use and trust.

C Control
O Obfuscate
V Verify
E Encrypt
R Reduce
T Track

C.O.V.E.R.T Protocol

Control - Control what information is collected, shared, and publicly available about you and your family. Obfuscate - Obfuscate sensitive information from public exposure. Verify - Verify that only authorized people have access to your critical information. Encrypt - Encrypt everything! Especially your data and communications. Reduce - Reduce the amount of personal data you expose by minimizing what you share online. Track - Track current status with periodic monitoring so you can detect exposure and take corrective action.

Execute the C.O.V.E.R.T Protocol

Recommended Tools

Our curated list of trusted third-party products and services

🔐 Encrypted Messengers

🌐 Virtual Private Networks (VPNs)

🔑 Multi-Factor Authentication (MFA)

🎒 Faraday Bags

📞 Digital Identities & VOIP

🔒 Password Management

💳 Masked Payments

💻 Preferred Operating Systems

Stay Updated

Check back regularly, as we continuously update this list to include the latest resources available. Subscribe to the podcast for deeper dives into these tools.

Subscribe to the Podcast