This is a list of some of many available software packages for encrypting, anonymizing and hiding digital information. Use these applications at your own risk. Remember to always investigate thoroughly to see if any security concerns have been disclosed before using any kind of software! Every piece of software may suffer from programming bugs and security vulnerabilities.
VeraCrypt is a free disk encryption software. It can create a virtual encrypted disk within a file or encrypt an entire partition. It also supports Steganographic storage, see below.
Simple open-source steganography tool that can hide messages inside a range of different image file types. Requires Java Runtime Environment. It also supports encrypting your secrets before hiding them. Well suited for beginners.
VSL Steganographic Laboratory
Very sophisticated tool for experimenting with Steganography. Open Source, but requires Java runtime environment. This software is intended for advanced users.
VeraCrypt (same as above)
VeraCrypt allows a single “hidden volume” to be created within another volume, thus supporting so-called «plausible deniability». Still, these tools must be used with caution.
Tor Onion Browser
For anonymity on the internet, use TorBrowser. Protects your real IP address from being exposed, but does not provide encryption at the exit node if you visit unencrypted web pages (not HTTPS).
AirVPN encrypted tunnel
One of several commercial VPN services that encrypts your internet traffic and hides your real IP address. May be used in combination with Tor for an even higher level of security that will better protect you from compromised Tor exit nodes when visiting unencrypted web sites.
Tails live operating system
A live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card.