wwwhisper is a privacy-friendly system which simplifies sharing Web resources which are not intended for everyone. It allows you to specify which HTTP resources can be accessed by owners of which email addresses. Mozilla Persona is used to prove that a visitor owns an allowed email address. No site-specific password is needed. The Persona UI makes the authentication process really smooth. wwwhisper is application-independent and can be used for any Web resources.
BleachBit deletes junk to recover disk space and maintain privacy. It rids your system of old junk including cache, Internet history, temporary files, unused locale files (better than localepurge), logs, and cookies. Designed for Linux systems, it wipes clean 50 applications including Adobe Reader, Bash, Firefox, Flash, OpenOffice.org, Opera, Real Player, Skype, and more. It shreds files so that they cannot be recovered, and it wipes free disk space to hide insecurely deleted files. It offers both a simple PyGTK GUI and a command line interface for automation.
creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.
The Dynamic Router Lite II project is a router project by the Dutch national police agency that allows Web-based client-control over the next-hop router for the client. A Dynamic Router Lite II system is placed as a default gateway between one or more client networks and a router network with multiple gateway-routers on it. The Dynamic Router Lite II system does policy-based routing with policy-based DNS to match the routing policy. By default a client will have no active gateway, and any attempted HTTP traffic to any domain will lead the user to the router's Web interface, where the user can then pick an appropriate next-hop router. Once picked, all traffic for the client including DNS will be forwarded to the next-hop router the user picked.