Commit 27edd3e8 authored by C1t1z3n 0n3's avatar C1t1z3n 0n3

1.0 simple but effective

Pipeline #19 canceled with stages
This diff is collapsed.
To submit your skill, replace this file with text from
One line description of the skill
## Description
A more verbose description, including any extra instructions or
information that didn't fit in the one line.
## Examples
* "Hello world"
* "Greetings planet earth"
* "Count up"
* "Count down"
## Credits
Your name
\ No newline at end of file
from adapt.intent import IntentBuilder
from mycroft.skills.core import MycroftSkill, intent_handler
from mycroft.util.log import LOG
class OpsecSkill(MycroftSkill):
def __init__(self):
super(OpsecSkill, self).__init__(name="OpsecSkill")
self.count = 0
def handle_opsec_guide_intent(self, message):
def handle_browser_privacy_intent(self, message):
def handle_browser_plugin_intent(self, message):
def handle_cookie_autodelete_intent(self, message):
def handle_decentraleyes_intent(self, message):
def handle_https_everywhere_intent(self, message):
def handle_privacy_badger_intent(self, message):
def handle_terms_didntread_intent(self, message):
def handle_ublock_origins_intent(self, message):
def handle_private_search_intent(self, message):
def handle_twitter_replacement_intent(self, message):
def handle_instagram_replacement_intent(self, message):
def handle_googledrive_replacement_intent(self, message):
def handle_videoconferencing_replacement_intent(self, message):
def handle_windows_whynot_intent(self, message):
def handle_secure_os_intent(self, message):
def handle_digital_footprint_intent(self, message):
def handle_private_information_intent(self, message):
def handle_online_surveillance_intent(self, message):
def handle_prism_intro_intent(self, message):
def handle_Surveillance_America_intent(self, message):
def handle_prism_brake_email_intent(self, message):
def handle_what_vpn_intent(self, message):
def handle_what_email_intent(self, message):
def handle_what_cloudstorage_intent(self, message):
def handle_what_socialnetwork_intent(self, message):
def handle_what_searchengine_intent(self, message):
def handle_what_fiveeys_intent(self, message):
# The "stop" method defines what Mycroft does when told to stop during
# the skill's execution. In this case, since the skill's functionality
# is extremely simple, there is no need to override it. If you DO
# need to implement stop, you should return True to indicate you handled
# it.
# def stop(self):
# return False
# The "create_skill()" method is used to create an instance of the skill.
# Note that it's outside the class itself.
def create_skill():
return OpsecSkill()
Citizen One recommends using one of the following browsers to protect your digital privacy: Mozilla Firefox is fast, reliable, open source and respects your privacy. Tor Browser is your choice if you need an extra layer of anonymity. Its a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy. The new open source browser Brave automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium.
Cookie AutoDelete automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required.
A record of everything an individual does online, including the files they create, information they send, and content they upload. Online information can migrate, persist, and resurface even many years later.
You should have full control over your data. We help you achieve that: a safe home for all your data. Secure, under your control and developed in an open, transparent and trustworthy way. We are Nextcloud. Sign up for a free account at
Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public.
HTTPS Everywhere encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
Pixelfed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or join one like or
The act of computer and digital activity, online and offline data, and internet traffic being monitored and logged by government agencies, ISPs and criminals.
Looking at risk as a function of consequence (as opposed to asset value) may allow for easier calculations applicable to your digital life. Elements that are unique to your life, such as social networks you use, any breaches your data has been in, and assessing your operating system vulnerabilities can aid in an risk assessment.
An understanding of your digital and cyber assets is required, the cyber OPSEC plan needs to be shaped in such a way that those resources are protected appropriately. By the assignment of assets to third parties and security functions used, both the issue of asset classification and responsibility are addressed. Information assets in your life need to be classified to indicate the degree of protection; the classification should result in appropriate information labeling and assignment to third party and use.
Oh no. It's time for a prism brake. With the prevalance of email it is important to use a provider you can trust to keep your messages private and secure. A few I know of are Proton Mail, Rise Up,, and Autistici/Inventati. For more information on Prism go to
PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle, among other things.
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse.
When it comes to browser plugins Citizen One recommends you install: Privacy Badger, uBlock Origin, Cookie AutoDelete, HTTPS Everywhere, Decentraleyes, and Terms of Service;Didn't Read.
Last name, Birth Day, Username, Password, Street address, Phone number, E-mail address, Mother's maiden name, Social Security number, School attended, License Plate number
Searx is an open source metasearch engine, aggregating the results of other search engines like Google, Bing and Qwant while not storing information about its users. No logs, no ads and no tracking. Try
If you ask me and Citizen One the most secure operating system is Qubes OS. But there are three linux operating systems I know of for privacy and security Kodachi Linux, Qubes OS, and Tails OS. If you are interested in exploring the world of Linux OS visit
NSA’s global surveillance dragnet is massive and due to the size American communications are inevitably caught up in the dragnet. NSA's surveillance is meant to targets foreigners, but sweeps in more bystanders than targets. Once this data is acquired, our data can be searched by other law enforcement agencies without a warrant. The NSA ignores attorney-client privilege. NSA's collection can include your whole email inbox. The most important thing to understand is that excessive surveillance is not necessarily making us safer.
Terms of Service; Didn’t Read “I have read and agree to the Terms” is the biggest lie on the web. This addon aims to fix that by grading websites based on their Terms of Service agreements and gives short summaries.
Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like e-mail. It also has the most users, and the most diverse (in terms of interests) users, looks good, and is easy to setup. For a list of instances go to
Minds is an open source and distributed social networking service, integrating the blockchain to reward the community. To explore Minds go to
uBlock Origin is an efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source.
Jitsi (previously SIP Communicator) is an audio/video and chat communicator with full end-to-end encryption. Jitsi is completely open source / free software, and is freely available under the terms of the GNU Lesser General Public License. No sign up, No Ads, No Tracking. Just visit or to have your next video conference.
Find a cloud storage provider that won't look through your files. If you are currently using Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should pick an alternative. I recommend NextCloud. You can self host or pick a provider.
Find a secure email provider that will keep your privacy in mind. Don't settle for ad-supported platforms. Never trust any company with your privacy, always encrypt. A few I know of are ProtonMail,, Tutanota, Mailfence,, Posteo, NeoMailBox, StartMail and Kolab Now.
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
Find a search engine that doesn't track your queries or build an advertising profile based on your searches. If you are currently using search engines like Google, Bing or Yahoo, you should pick an alternative like searX, Start Page, Duck Duck Go, or Qwant.
I love this question citizen one won't let me on social media they say I'm too young. Find a social network that doesn't pry into your data or monetize your profile. I recommend Mastodon, Peertube and PixelFed, but there are also diaspora*, GNU Social, Friendica, Minds and many more. You can use or to find more.
Using a VPN will not keep your browsing hapits anonymous, nor will it add additional security to non-secure (HTTP) traffic. If you're looking for additional privacy from your ISP or on a public Wi-Fi network a VPN may be the solution for you. Some good ones I know of are black VPN, Express VPN, Proton VPN and Nord VPN. For more info please visit
1. Data syncing is by default enabled. 2. Your device is by default tagged with a unique advertising ID. 3. Cortana can collect any of your data. 4. Microsoft can collect any personal data. 5. Your data can be shared.
{"__mycroft_skill_firstrun": false}
\ No newline at end of file
auto delete
cloud storage
cloud sync
decentral eyes
google drive
do not
cyber security
cyber ops
IBM Notes
Microsoft Outlook
Microsoft Exchange
search engine
search engine
Social Network
Social Networks
Social Media
Google Hangouts
Zoom Meeting
windows 10
windows OS
Markdown is supported
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment