mirror of
https://github.com/privacyguides/i18n.git
synced 2026-05-08 19:51:18 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[ما نوصي به من برامج مراسلة فورية](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we
|
||||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. وهم يعملون منذ ٢٠١٤. ومقرُّهم في برلين في ألمانيا. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. ويمكن للأفراد والمؤسسات مشاركة المعلومات عبرها باستخدام «خدمات .onion الخفية»، وذلك دون نهك خصوصيتهم. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة.
|
||||
|
||||
[نظرة عامة شاملة عن تور :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we
|
||||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we
|
||||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we
|
||||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: Eine Übersicht über mehrere Netzwerkarchitekturen, die häufig vo
|
||||
|
||||
Es gibt mehrere Netzwerkarchitekturen, die häufig verwendet werden, um Nachrichten zwischen Menschen zu übertragen. Diese Netzwerke können unterschiedliche Datenschutzgarantien bieten, weshalb es sich lohnt, bei der Entscheidung, welche App du verwenden möchtest, ihr [Bedrohungsmodell](../basics/threat-modeling.md) zu berücksichtigen.
|
||||
|
||||
[Empfohlene Instant Messenger](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Zentralisierte Netzwerke
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt wurde, um das Internet mit so viel Privatsphäre wie möglich zu nutzen. Bei richtiger Nutzung ermöglicht das Netzwerk privates und anonymes Surfen und Kommunikation. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor funktioniert, indem es deinen Internetverkehr über von Freiwilligen betriebenen Server leitet, anstatt eine direkte Verbindung zu der Website herzustellen, die du besuchen willst. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Die Privatsphäre geht letztendlich um menschliche Informationen, und das ist wi
|
||||
|
||||
Viele Menschen verwechseln die Begriffe zur **Privatsphäre**, **Sicherheit** und **Anonymität**. Es gibt Leute, die verschiedene Produkte als "nicht privat" kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privatsphäre**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Nimm zum Beispiel Einwilligungserklärungen für Cookies. Auf den verschiedenen
|
||||
|
||||
Datenschutz ist etwas, das standardmäßig in die von uns genutzte [Software und die von uns genutzten Dienste](../tools.md) implementiert sein muss, denn man kann die meisten Anwendungen und Dienste nicht selbst auf Datenschutz trimmen.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Quellen
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) von Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Der Versuch, alle deine Daten ständig vor allen zu schützen, ist unpraktisch,
|
||||
<div markdown>
|
||||
**Privacy Guides** hat eine engagierte [Community](https://discuss.privacyguides.net), die unabhängig verschiedene *Privacy-Tools* und -Dienste überprüft. Alle unsere Empfehlungen erfüllen eine Reihe strenger Kriterien, um sicherzustellen, dass sie den meisten Menschen den größten Nutzen bringen und das beste Gleichgewicht zwischen Privatsphäre, Sicherheit und Komfort bieten. Als Teil einer gemeinnützigen **öffentlichen Wohltätigkeitsorganisation** hat Privacy Guides strenge **journalistische Standards** und Richtlinien, um sicherzustellen, dass unsere Empfehlungen frei von Interessenkonflikten sind, und wir arbeiten nicht mit Anbietern oder Partnerprogrammen zusammen, die unsere Bewertungen und Empfehlungen beeinflussen könnten.
|
||||
|
||||
[:material-heart:{.pg-red} Unterstütze unsere Arbeit](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Werbefreie Empfehlungen**
|
||||
@@ -83,77 +84,6 @@ Der Versuch, alle deine Daten ständig vor allen zu schützen, ist unpraktisch,
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 private E-Mail-Anbieter
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail ist ein E-Mail-Dienst mit einem Schwerpunkt auf Datenschutz, Verschlüsselung, Sicherheit und Benutzerfreundlichkeit. Sie sind seit 2013 in Betrieb. Die Proton AG hat ihren Sitz in Genf, Schweiz. Der Proton Mail Free Tarif beinhaltet 500 MB Mailspeicher, den du kostenlos auf bis zu 1 GB erweitern kannst.
|
||||
|
||||
[:octicons-arrow-right-24: Lese die vollständige Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org ist ein E-Mail-Dienst, mit dem Ziel sicher und werbefrei zu sein und der mit 100% Ökostrum betrieben wird. Er wird seit 2014 betrieben. Mailbox.org hat seinen Sitz in Berlin, Deutschland. Konten beginnen mit 2 GB Speicherplatz, der nach Bedarf erweitert werden kann.
|
||||
|
||||
[:octicons-arrow-right-24: Lese die vollständige Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (ehemals *Tutanota*) ist ein E-Mail-Dienst mit einem Fokus auf Sicherheit und Datenschutz durch Verschlüsselung. Tuta ist seit 2011 in Betrieb und hat seinen Sitz in Hannover, Deutschland. Kostenlose Konten beginnen mit 1 GB Speicherplatz.
|
||||
|
||||
[:octicons-arrow-right-24: Lese die vollständige Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Beste VPN-Anbieter
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Sichere Cloud-Speicherdienste
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Beste Web-Browser
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: Weitere empfohlene **Datenschutz-Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Beste mobile Browser](mobile-browsers.md ""){.md-button} [Top-Browser-Erweiterungen](browser-extensions.md ""){.md-button} [DNS-Server](dns.md ""){.md-button} [E-Mail-Aliasing-Dienste](email-aliasing.md ""){.md-button} [Foto-Organisationstools](photo-management.md ""){.md-button} [PC-Betriebssysteme](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## Über Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Gegründet im Jahr 2021 aufgrund der Schwierigkeit, unvoreingenommene Rezensente
|
||||
|
||||
Bekannt aus **WIRED**, **Tweakers.net**, **The New York Times** und vielen anderen Publikationen als zuverlässige Quelle für Datenschutz- und Sicherheitswissen.
|
||||
|
||||
[:material-information: Mehr über uns](about.md){ class="md-button md-button--primary" } [:material-email: Abonniere unseren Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ Im modernen Zeitalter der digitalen Datenausbeutung ist deine Privatsphäre noch
|
||||
|
||||
Viele Menschen verwechseln die Begriffe Privatsphäre, Sicherheit und Anonymität. Es gibt Leute, die verschiedene Produkte als „nicht privat“ kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht.
|
||||
|
||||
[Privatsphäre vs. Sicherheit vs. Anonymität](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
Dies sind unsere Empfehlungen für verschlüsselte **Echtzeitkommunikation**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Arten von Kommunikationsnetzen :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Verschlüsselte Messenger
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
Das **Tor** Netzwerk besteht aus von Freiwilligen betriebenen Servern, die es kostenlos ermöglichen, die eigene Privatsphäre und Sicherheit im Internet zu verbessern. Einzelpersonen und Organisationen können auch Informationen über das Tor-Netzwerk mit ".onion versteckten Diensten" austauschen, ohne ihre Privatsphäre zu gefährden. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung.
|
||||
|
||||
[Detaillierte Tor-Übersicht :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tipp</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[Προτεινόμενες εφαρμογές άμεσων μηνυμάτων](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Επειδή η διαδικτυακή κυκλοφορία του Tor είναι δύσκολο να μπλοκαριστεί και να ανιχνευθεί, το Tor είναι ένα αποτελεσματικό εργαλείο παράκαμψης της λογοκρισίας.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση
|
||||
|
||||
Πολλά άτομα συγχέουν τις έννοιες της **ιδιωτικότητας** (privacy), της **ασφάλειας** (security), και της **ανωνυμίας** (anonymity). Συγκεκριμένα στα Ελληνικά τώρα, η αγγλική λέξη "privacy" έχει συχνά μεταφραστεί ως απόρρητο, αν και το απόρρητο είναι ευρύτερη έννοια. Θα λέγαμε πως περικλείει τόσο την ιδιωτικότητα, όσο την ασφάλεια και την ανωνυμία. Ετυμολογικά σημαίνει "αυτό που δεν λέγεται ή ορίζεται." Αγγλικές λέξεις που της αντιστοιχούν πέραν του "privacy" είναι: "confidentiality", "secret", "unspeakable", "undefinable." Για την αποφυγή σύγχησης, συνεπώς, μεταφράζουμε το "privacy" ως ιδιωτικότητα σε όλες τις περιπτώσεις εκτός από αυτές όπου νοείται ευρήτερα. Αν θέλεις να αναπτύξεις σωστή κρίση για τα συστήματα που χρησιμοποιείς καθημερινά, είναι σημαντικότατο να αντιληφθείς πως και πότε το απόρρητο διαχωρίζεται σε ιδιωτικότητα, ασφάλεια, και ανωνυμία· και πότε η καθεμία από αυτές παίζει ρόλο. Θα ακούσεις, για παράδειγμα, άτομα να κριτικάρουν διάφορα προϊόντα ως «μη-ιδιωτικά» ενώ στην πραγματικότητα εννοούν πως αυτά δεν προσφέρουν ανωνυμία. Στον παρών ιστότοπο καλύπτουμε και τα τρία θέματα, μα είναι κρίσιμο, όπως προαναφέραμε, να θυμάσαι την εννοιολογική τους διαφορά όσο διαβάζεις τις συμβουλές μας.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Ιδιωτικότητα**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση
|
||||
|
||||
Η ιδιωτικότητα (και το απόρρητο γενικότερα) οφείλει να βρίσκεται ενσωματωμένο στο [ λογισμικό και τις υπηρεσίες](../tools.md) που χρησιμοποιούμε εκ προεπιλογής, δεν μπορείς από μόνο σου να παραποιήσεις τις περισσότερες εφαρμογές ώστε να είναι ιδιωτικές.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Πηγές
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) από Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. Θα ακούσεις, για παράδειγμα, άτομα να κριτικάρουν διάφορα προϊόντα ως «μη-ιδιωτικά» ενώ στην πραγματικότητα εννοούν πως αυτά δεν προσφέρουν ανωνυμία. Στον παρών ιστότοπο καλύπτουμε και τα τρία θέματα, μα είναι κρίσιμο, όπως προαναφέραμε, να θυμάσαι την εννοιολογική τους διαφορά όσο διαβάζεις τις συμβουλές μας.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Το Tor** είναι μια ομάδα διακομιστών που λειτουργούν εθελοντικά και σας επιτρέπουν να συνδεθείτε δωρεάν και να βελτιώσετε την ιδιωτικότητα και την ασφάλειά σας στο Διαδίκτυο. Τα άτομα και οι οργανισμοί μπορούν επίσης να μοιράζονται πληροφορίες μέσω του δικτύου Tor με τις κρυφές υπηρεσίες ".onion" χωρίς να θέτουν σε κίνδυνο την ιδιωτικότητά τους. Επειδή η διαδικτυακή κυκλοφορία του Tor είναι δύσκολο να μπλοκαριστεί και να ανιχνευθεί, το Tor είναι ένα αποτελεσματικό εργαλείο παράκαμψης της λογοκρισίας.
|
||||
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Συμβουλή</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we
|
||||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Amasgvatado](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -3,7 +3,7 @@ title: Puestos de Trabajo
|
||||
description: Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad. Cualquier puesto vacante que podremos tener en el futuro será publicado aquí.
|
||||
---
|
||||
|
||||
Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad quienes están trabajando para avanzar nuestra misión de proteger la libertad de expresión y promover tecnología respetuosa con la privacidad. Como organización sin ánimo de lucro, nos expandimos muy lentamente para garantizar la sostenibilidad del proyecto a largo plazo. Todos los miembros de nuestro equipo figuran [aquí](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Por favor, considera [donar](https://donate.magicgrants.org/privacyguides) para apoyar nuestra causa.
|
||||
Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad quienes están trabajando para avanzar nuestra misión de proteger la libertad de expresión y promover tecnología respetuosa con la privacidad. Como organización sin ánimo de lucro, nos expandimos muy lentamente para garantizar la sostenibilidad del proyecto a largo plazo. Todos los miembros de nuestro equipo figuran aquí. Por favor, considera donar para apoyar nuestra causa.
|
||||
|
||||
Ocasionalmente buscamos buenos redactores periodísticos, revisores de productos y expertos en privacidad para que nos ayuden, y los puestos vacantes se publicarán a continuación.
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@ description: Una visión general de varias arquitecturas de red comúnmente util
|
||||
|
||||
Existen varias arquitecturas de red utilizadas habitualmente para transmitir mensajes entre personas. Estas redes pueden ofrecer diferentes garantías de privacidad, por lo que conviene tener en cuenta tu [modelo de amenaza](../basics/threat-modeling.md) a la hora de decidir qué aplicación utilizar.
|
||||
|
||||
[Servicios de Mensajería Instantánea Recomendados](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Redes centralizadas
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor es una red descentralizada y gratuita diseñada para utilizar I
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) es una red gratuita y descentralizada diseñada para usar el Internet con la mayor privacidad posible. Si se utiliza correctamente, la red permite la navegación y las comunicaciones privadas y anónimas. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor funciona enrutando tu tráfico de Internet a través de servidores operados por voluntarios, en vez de realizar conexiones directas al sitio que estás tratando de visitar. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Página Principal }
|
||||
|
||||
+1
-1
@@ -161,7 +161,7 @@ Para comprobar la autenticidad y seguridad del modelo, busca:
|
||||
- Comentarios de la comunidad y estadísticas de uso
|
||||
- Un distintivo "Seguro" junto a la ficha del modelo (solo Hugging Face)
|
||||
- Checksums coincidentes[^1]
|
||||
- En Hugging Face, puedes encontrar el hash haciendo clic en un archivo de modelo y buscando el botón **Copy SHA256** debajo de él. Debes comparar esta checksum con la del fichero modelo que has descargado.
|
||||
- En Hugging Face, puedes encontrar el hash haciendo clic en un archivo de modelo y buscando el botón **Copy SHA256** debajo de él. Debes comparar esta checksum con la del fichero modelo que has descargado.
|
||||
|
||||
A downloaded model is generally safe if it satisfies all the above checks.
|
||||
|
||||
|
||||
@@ -38,7 +38,7 @@ También hay muchas alternativas privadas a las aplicaciones que vienen preinsta
|
||||
|
||||
Cuando compras un teléfono Android, el sistema operativo por defecto viene con aplicaciones y funcionalidades que no forman parte de Android Open Source Project. Muchas de estas aplicaciones -incluso aplicaciones como el marcador que proporcionan una funcionalidad básica del sistema- requieren integraciones invasivas con Google Play Services, que a su vez pide privilegios para acceder a tus archivos, almacenamiento de contactos, registros de llamadas, mensajes SMS, ubicación, cámara, micrófono y muchas otras cosas en tu dispositivo para que esas aplicaciones básicas del sistema y muchas otras aplicaciones funcionen en primer lugar. Frameworks como Google Play Services aumentan la superficie de ataque de tu dispositivo y son la fuente de varios problemas de privacidad con Android.
|
||||
|
||||
Este problema se puede resolver utilizando una distribución alternativa de Android, comúnmente conocida como _ROM personalizada_, que no venga con una integración tan invasiva. Desafortunadamente, varias distribuciones modificadas de Android suelen violar el modelo de seguridad de Android al no soportar características críticas de seguridad como el AVB, protección de reversión, actualizaciones del firmware, etc. Algunas distribuciones también incluyen compilaciones [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) que exponen la raíz a través de [ADB](https://developer.android.com/studio/command-line/adb) y requieren políticas SELinux [más permisivas](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) para acomodar las características de depuración, lo que resulta en una mayor superficie de ataque y un modelo de seguridad debilitado.
|
||||
Este problema se puede resolver utilizando una distribución alternativa de Android, comúnmente conocida como _ROM personalizada_, que no venga con una integración tan invasiva. Desafortunadamente, varias distribuciones modificadas de Android suelen violar el modelo de seguridad de Android al no soportar características críticas de seguridad como el AVB, protección de reversión, actualizaciones del firmware, etc. Algunas distribuciones también incluyen compilaciones [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) que exponen la raíz a través de [ADB](https://developer.android.com/studio/command-line/adb) y requieren políticas SELinux más permisivas para acomodar las características de depuración, lo que resulta en una mayor superficie de ataque y un modelo de seguridad debilitado.
|
||||
|
||||
Idealmente, cuando escojas una distribución de Android, deberías asegurarte de que mantenga el modelo de seguridad de Android. Como mínimo, la distribución debería tener compilaciones de producción, compatibilidad con AVB, protección contra reversiones, actualizaciones puntuales del firmware y del sistema operativo, y SELinux en [modo de imposición](https://source.android.com/security/selinux/concepts#enforcement_levels). Todas nuestras distribuciones de Android recomendadas cumplen estos criterios:
|
||||
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Las Redes Privadas Virtuales desplazan el riesgo de tu ISP a un ter
|
||||
|
||||
Las Redes Privadas Virtuales son una forma de ampliar el extremo de tu red para que salga por otro lugar en el mundo.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normalmente, un ISP puede ver el flujo de tráfico de Internet que entra y sale de Tu dispositivo de terminación de red (es decir, el módem). Los protocolos de cifrado como HTTPS se utilizan habitualmente en Internet, por lo que es posible que no puedan ver exactamente lo que publicas o lees, pero pueden hacerse una idea de los [dominios que solicitas](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
El uso de una VPN oculta incluso esta información a tu ISP, al trasladar la confianza que depositas en tu red a un servidor situado en otro lugar del mundo. Como resultado, el ISP solo ve que estás conectado a una VPN y nada sobre la actividad que estás pasando a través de ella.
|
||||
|
||||
@@ -12,6 +12,8 @@ En última instancia, la privacidad tiene que ver con la información humana, y
|
||||
|
||||
Mucha gente confunde los conceptos de **privacidad**, **seguridad**, y **anonimato**. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacidad**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Por ejemplo, los formularios de consentimiento de cookies. Es posible que los en
|
||||
|
||||
La privacidad es algo que tenemos que tener incorporado en [el software y los servicios](../tools.md) que utilizamos por defecto, no puedes hacer que la mayoría de las aplicaciones sean privadas por tu cuenta.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Fuentes
|
||||
|
||||
- [Por Qué Importa La Privacidad](https://amazon.com/dp/0190939044) (2021) por Neil Richards
|
||||
|
||||
@@ -101,7 +101,7 @@ Si utilizas iOS y estás en situación de alto riesgo, tenemos tres sugerencias
|
||||
|
||||
2. Activa los registros de _sysdiagnose_ a menudo y respáldalos externamente. Estos registros pueden proporcionar datos muy valiosos a futuros investigadores forenses en caso necesario.
|
||||
|
||||
El proceso para hacerlo varía según el modelo, pero puedes activarlo en los teléfonos más nuevos manteniendo pulsados _Apagar_ + _Subir volumen_ + _Bajar volumen_ hasta que sientas una breve vibración. Transcurridos unos minutos, el registro _sysdiagnose_ con fecha y hora aparecerá en **Configuración** > **Privacidad y seguridad** > **Análisis y Mejoras** > **Datos de Análisis**.
|
||||
El proceso para hacerlo varía según el modelo, pero puedes activarlo en los teléfonos más nuevos manteniendo pulsados _Apagar_ + _Subir volumen_ + _Bajar volumen_ hasta que sientas una breve vibración. Transcurridos unos minutos, el registro _sysdiagnose_ con fecha y hora aparecerá en **Configuración** > **Privacidad y seguridad** > **Análisis y Mejoras** > **Datos de Análisis**.
|
||||
|
||||
3. Activa eñ [Modo de Bloqueo](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode).
|
||||
|
||||
|
||||
+4
-74
@@ -72,7 +72,8 @@ La seguridad no consiste solo en las *herramientas de privacidad* que utilices o
|
||||
<div markdown>
|
||||
**Privacy Guides** tiene una [comunidad](https://discuss.privacyguides.net) dedicada que revisa de forma independiente varias *herramientas de privacidad* y servicios. Cada una de nuestras recomendaciones cumple un estricto conjunto de criterios para garantizar que aporten el máximo valor a la mayoría de las personas y ofrezcan el mejor equilibrio entre privacidad, seguridad y comodidad. Como parte de una **organización benéfica pública** sin ánimo de lucro, Privacy Guides aplica estrictas **normas periodísticas** y políticas para garantizar que nuestras recomendaciones estén libres de conflictos de intereses, y no nos asociamos con proveedores o programas de afiliación que puedan influir en nuestras reseñas y recomendaciones.
|
||||
|
||||
[:material-heart:{.pg-red} Apoya Nuestro Trabajo](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Recomendaciones Sin Publicidad**
|
||||
@@ -84,77 +85,6 @@ La seguridad no consiste solo en las *herramientas de privacidad* que utilices o
|
||||
|
||||
</div>
|
||||
|
||||
### Los 3 Mejores Proveedores Privados de Correo Electrónico
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail es un servicio de correo electrónico centrado en la privacidad, el cifrado, la seguridad y la facilidad de uso. Ha estado en operación desde 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org es un servicio de correo electrónico seguro, sin publicidad y alimentado de forma privada con energía 100% ecológica. Ha estado en operación desde 2014. Mailbox.org tiene su sede en Berlín, Alemania. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (antes *Tutanota*) es un servicio de correo electrónico centrado en la seguridad y la privacidad mediante el uso de cifrado. Tuta lleva funcionando desde 2011 y tiene su sede en Hannover, Alemania. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Leer Reseña Completa](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Mejores Servicios VPN
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Servicios Seguros de Almacenamiento en la Nube
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Mejores Navegadores Web
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: Más Recomendaciones de **Herramientas de Privacidad**](tools.md){ class="md-button md-button--primary" }
|
||||
[Mejores Navegadores Móviles](mobile-browsers.md ""){.md-button} [Mejores Extensiones de Navegador](browser-extensions.md ""){.md-button} [Servidores DNS](dns.md ""){.md-button} [Servicios de Alias de Correo Electrónico](email-aliasing.md ""){.md-button} [Herramientas de Organización de Fotos](photo-management.md ""){.md-button} [Sistemas Operativos de PC](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## Sobre Privacy Guides
|
||||
@@ -167,7 +97,7 @@ Creado en 2021 ante la dificultad de encontrar revisiones imparciales en el mund
|
||||
|
||||
Privacy Guides aparece en **WIRED**, **Tweakers.net**, **The New York Times** y otras publicaciones como una fuente confiable de conocimientos sobre privacidad y seguridad.
|
||||
|
||||
[:material-information: Conoce más sobre quiénes somos](about.md){ class="md-button md-button--primary" } [:material-email: Únete a nuestro boletín](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -185,6 +115,6 @@ En la era moderna de explotación de información digital, tu privacidad nunca h
|
||||
|
||||
Muchas personas confunden los conceptos de privacidad, seguridad y anonimato. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno.
|
||||
|
||||
[Privacidad vs Seguridad vs Anonimato](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -97,7 +97,7 @@ Tor Browser es la única manera de navegar por Internet de forma verdaderamente
|
||||
|
||||
#### Valores generales predeterminados de los escudos de Brave
|
||||
|
||||
Brave incluye algunas medidas antihuellas en su función [Escudos](https://support.brave.com/hc/articles/360022973471-What-is-Shields). Te sugerimos configurar estas opciones [globalmente](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) en todas las páginas que visites.
|
||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit.
|
||||
|
||||
Las opciones de los escudos pueden reducirse según las necesidades de cada sitio, pero por defecto recomendamos configurar lo siguiente:
|
||||
|
||||
@@ -202,7 +202,7 @@ Estas opciones se encuentran en :material-menu:/:fontawesome-solid-ellipsis: →
|
||||
|
||||
#### Brave Sync
|
||||
|
||||
[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) permite que tus datos de navegación (historial, favoritos, etc.) sean accesibles en todos tus dispositivos sin necesidad de tener una cuenta y los protege con E2EE.
|
||||
[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||
|
||||
## Cromite (Android)
|
||||
|
||||
@@ -243,7 +243,7 @@ Estas opciones se encuentran en :material-menu: → :gear: **Configuración**
|
||||
|
||||
- [x] Selecciona **Usar siempre conexiones seguras**
|
||||
|
||||
Esto evita que te conectes involuntariamente a un sitio web en texto plano HTTP. HTTP es muy poco común hoy en día, por lo que esto debería tener poco o ningún impacto en tu navegación diaria.
|
||||
This prevents you from unintentionally connecting to a website in plain-text HTTP. HTTP es muy poco común hoy en día, por lo que esto debería tener poco o ningún impacto en tu navegación diaria.
|
||||
|
||||
#### Adblock Plus settings
|
||||
|
||||
@@ -304,7 +304,7 @@ Esto evita que Siri utilice el contenido de Safari para las sugerencias de Siri.
|
||||
|
||||
- [ ] Desactiva **Sugerencias del Motor de Búsqueda**
|
||||
|
||||
Este ajuste envía todo lo que escribas en la barra de direcciones al motor de búsqueda configurado en Safari. Desactivar las sugerencias de búsqueda te permite controlar con mayor precisión los datos que envías al proveedor de tu motor de búsqueda.
|
||||
Este ajuste envía todo lo que escribas en la barra de direcciones al motor de búsqueda configurado en Safari. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
||||
|
||||
#### Perfiles
|
||||
|
||||
|
||||
@@ -48,9 +48,9 @@ Elige una **suite de ofimática** que no requiera iniciar sesión para acceder a
|
||||
**OnlyOffice** es una suite ofimática gratuita, basada en la nube y de código abierto, con amplias funcionalidades, incluyendo la integración con Nextcloud.
|
||||
|
||||
[:octicons-home-16: Página principal](https://onlyoffice.com){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Política de privacidad" }
|
||||
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentación}
|
||||
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Código fuente" }
|
||||
:octicons-eye-16:{ .card-link title="Política de privacidad" }
|
||||
:octicons-info-16:{ .card-link title=Documentación}
|
||||
:octicons-code-16:{ .card-link title="Código fuente" }
|
||||
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads "Descargas"</summary>
|
||||
|
||||
@@ -20,8 +20,8 @@ Para cambiar cualquier directiva de grupo, haz doble clic en ella y selecciona H
|
||||
#### Device Guard
|
||||
|
||||
- Activar la Seguridad Basada en la Virtualización: \*_Habilitada_
|
||||
- Nivel de Seguridad de la Plataforma: **Arranque Seguro y Protección de DMA**
|
||||
- Configuración de Inicio Seguro: **Habilitada**
|
||||
- Nivel de Seguridad de la Plataforma: **Arranque Seguro y Protección de DMA**
|
||||
- Configuración de Inicio Seguro: **Habilitada**
|
||||
|
||||
#### Administración de Comunicaciones de Internet
|
||||
|
||||
@@ -52,14 +52,14 @@ Reproducción Automática y Ejecución Automática son funciones que permiten a
|
||||
- Desactivar Reproducción Automática: **Habilitada**
|
||||
- Deshabilitar Reproducción Automática para Dispositivos que no son de Volumen: **Habilitada**
|
||||
- Establece el Comportamiento Predeterminado para Ejecución Automática: **Habilitada**
|
||||
- Comportamiento Predeterminado de Ejecución Automática: **No Ejecutar Ningún Comando de Ejecución Automática**
|
||||
- Comportamiento Predeterminado de Ejecución Automática: **No Ejecutar Ningún Comando de Ejecución Automática**
|
||||
|
||||
#### Cifrado de Unidad BitLocker
|
||||
|
||||
Es posible que desees volver a cifrar la unidad del sistema operativo después de cambiar estos ajustes.
|
||||
|
||||
- Elija Método de Cifrado e Intensidad de Cifrado de Unidad (Windows Vista, Windows Server 2008, Windows 7): **Habilitada**
|
||||
- Seleccione el método de cifrado: **AES-256**
|
||||
- Seleccione el método de cifrado: **AES-256**
|
||||
|
||||
Establecer la intensidad de cifrado para la política de Windows 7 todavía aplica esa intensidad a las nuevas versiones de Windows.
|
||||
|
||||
@@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b
|
||||
#### Recopilación de Datos y Versiones Preliminares
|
||||
|
||||
- Permitir Datos de Diagnóstico: **Habilitada**
|
||||
- Opciones: **Enviar Datos de Diagnóstico Necesarios** (Edición Pro); o
|
||||
- Opciones: **Datos de Diagnóstico Desactivados** (Edición Enterprise o Education)
|
||||
- Opciones: **Enviar Datos de Diagnóstico Necesarios** (Edición Pro); o
|
||||
- Opciones: **Datos de Diagnóstico Desactivados** (Edición Enterprise o Education)
|
||||
- Limitar Recopilación de Registros de Diagnóstico: **Habilitada**
|
||||
- Limitarn Recopilación de Volcados: **Habilitada**
|
||||
- Limitar los Datos de Diagnóstico Opcionales para el Análisis de Escritorio: **Habilitada**
|
||||
- Opciones: **Desactivar la Colección de Análisis de Escritorio**
|
||||
- Opciones: **Desactivar la Colección de Análisis de Escritorio**
|
||||
- No Volver a Mostrar Notificaciones de Comentarios: **Habilitada**
|
||||
|
||||
#### Explorador de Archivos
|
||||
@@ -118,7 +118,7 @@ Este último ajuste desactiva OneDrive en tu sistema; asegúrate de cambiarlo a
|
||||
- Permitir el Uso de Cortana: **Deshabilitada**
|
||||
- No buscar en Internet o Mostrar Resultados de Internet en Search: **Habilitada**
|
||||
- Definir Qué Información se Comparte en Search: **Habilitada**
|
||||
- Tipo de información: **Información anónima**
|
||||
- Tipo de información: **Información anónima**
|
||||
|
||||
#### Sincronizar la Configuración
|
||||
|
||||
@@ -132,4 +132,4 @@ Este último ajuste desactiva OneDrive en tu sistema; asegúrate de cambiarlo a
|
||||
|
||||
- No Enviar Datos Adicionales: **Habilitada**
|
||||
- Consentimiento > Configurar Consentimiento Predeterminado: **Habilitada**
|
||||
- Nivel de consentimiento: **Preguntar siempre antes de enviar datos**
|
||||
- Nivel de consentimiento: **Preguntar siempre antes de enviar datos**
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Vigilancia masiva](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
Estas son nuestras recomendaciones para la comunicación cifrada **en tiempo real**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Tipos de Redes de Comunicación :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Servicios de Mensajería Cifrados
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** es un grupo de servidores operados por voluntarios que te permiten conectarte gratuitamente, además de mejorar tu privacidad y seguridad en Internet. Individuos y organizaciones también pueden compartir información a través de la red Tor con los "servicios ocultos .onion" sin comprometer su privacidad. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura.
|
||||
|
||||
[Descripción detallada de Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Consejo</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[پیامرسانهای توصیه شده](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we
|
||||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. آنها از سال 2014 شروع به کار کردهاند. Mailbox.org در برلین آلمان مستقر است. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: Une présentation de plusieurs architectures réseau couramment uti
|
||||
|
||||
Il existe plusieurs architectures réseau couramment utilisées pour relayer des messages entre des personnes. Ces réseaux peuvent offrir des garanties différentes en matière de protection de la vie privée. C'est pourquoi il est utile de tenir compte de votre [modèle de menace](../basics/threat-modeling.md) lorsque vous décidez quelle application à utiliser.
|
||||
|
||||
[Messageries instantanées recommandées](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Réseaux Centralisés
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor est un réseau décentralisé, gratuit, conçu pour utiliser In
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) est un réseau décentralisé, gratuit, conçu pour utiliser Internet avec le plus de confidentialité possible. S'il est utilisé correctement, le réseau permet une navigation et des communications privées et anonymes. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor fonctionne en acheminant votre trafic Internet via des serveurs gérés par des volontaires, au lieu d'établir une connexion directe avec le site que vous essayez de visiter. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title="Page d'accueil" }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Les réseaux privés virtuels déplacent le risque de votre FAI à
|
||||
|
||||
Les Réseaux Privés Virtuels sont un moyen d'étendre l'extrémité de votre réseau avec une sortie située ailleurs dans le monde.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normalement, un FAI peut voir le flux de trafic internet qui entre et sort de votre dispositif de terminaison de réseau (c'est-à-dire votre box/modem). Les protocoles de chiffrement tels que HTTPS sont couramment utilisés sur internet, ils se peut donc qu'ils ne soient pas en mesure de voir exactement ce que vous publiez ou lisez, mais ils peuvent avoir une idée [des domaines que vous visitez](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
L'utilisation d'un VPN permet de dissimuler ces informations à votre FAI, en transférant la confiance que vous accordez à votre réseau vers un serveur situé ailleurs dans le monde. Par conséquent, le FAI ne voit que le fait que vous êtes connecté à un VPN et rien sur l'activité que vous lui transmettez.
|
||||
|
||||
@@ -12,6 +12,8 @@ La protection de la vie privée concerne en fin de compte des informations humai
|
||||
|
||||
De nombreuses personnes confondent les concepts de **vie privée**, **sécurité**, et **anonymat**. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Confidentialité**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Prenons l'exemple des formulaires de consentement des cookies. Vous les rencontr
|
||||
|
||||
La protection de la vie privée doit être intégrée par défaut dans les [logiciels et services](../tools.md) que nous utilisons, car il est impossible de forcer de vous-même la plupart des applications à respecter votre vie privée.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, es
|
||||
<div markdown>
|
||||
**Privacy Guides** dispose d'une [communauté] dédiée (https://discuss.privacyguides.net) qui évalue de manière indépendante divers *outils et services de protection de la vie privée. Chacune de nos recommandations répond à un ensemble de critères stricts afin de s'assurer qu'elles apportent la plus grande valeur au plus grand nombre et qu'elles offrent le meilleur équilibre entre vie privée, sécurité et commodité. En tant que membre d'une **organisation caritative publique** à but non lucratif, Privacy Guides applique des **normes journalistiques** et des politiques strictes pour garantir que nos recommandations sont exemptes de conflits d'intérêts. Nous ne nous associons pas à des fournisseurs ou à des programmes d'affiliation susceptibles d'influencer nos évaluations et nos recommandations.
|
||||
|
||||
[:material-heart:{.pg-red} Soutenir notre travail](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Recommandations sans publicité**
|
||||
@@ -83,77 +84,6 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, es
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 des fournisseurs d'emails privés
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail est un service d'e-mail qui met l'accent sur la confidentialité, le chiffrement, la sécurité et la facilité d'utilisation. Ils sont en activité depuis 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Lire l'article complet](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org est un service de messagerie électronique sécurisé, sans publicité et alimenté par une énergie 100% écologique. Il est en activité depuis 2014. Mailbox.org est basé à Berlin, en Allemagne. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta(anciennement *Tutanota*) est un service de mesagerie électronique mettant l'accent sur la sécurité et la protéction de la vie privée via l'utilisation du cryptage. Tuta est en activité depuis 2011 et est basée à Hanovre, en Allemagne. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Lire l'article complet](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Les meilleurs fournisseurs de VPN
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Services de stockage sécurisé dans le Cloud
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Meilleures navigateurs Web
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: Plus de recoomandations d' **Outils pour la protéction de la vie privée**](tools.md){ class="md-button md-button--primary" }
|
||||
[Meilleurs Navigateurs Mobiles](mobile-browsers.md ""){.md-button} [Meilleurs Extensions pour Navigateurs](browser-extensions.md ""){.md-button} [Serveurs DNS](dns.md ""){.md-button} [Fournsseurs d'Alias pour Messagerie électrionque](email-aliasing.md ""){.md-button} [Logiciels d'Organsations de Photos](photo-management.md ""){.md-button} [Système d'Exploitation pour Ordinateurs](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## À propos de Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Créé en 2021 en raison de la difficulté à trouver des évaluateurs impartiau
|
||||
|
||||
Il a été cité dans **WIRED**, **Tweakers.net**, **The New York Times** et de nombreuses autres publications comme une source fiable de connaissances en matière de protection de la vie privée et de sécurité.
|
||||
|
||||
[:material-information: En savoir plus sur nous](about.md){ class="md-button md-button--primary" } [:material-email: S'abonner à notre Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ Nous recommandons une grande variété d'**outils de confidentialité** (a.k.a.
|
||||
|
||||
De nombreuses personnes confondent les notions de vie privée, de sécurité et d'anonymat. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu.
|
||||
|
||||
[Vie privée vs Sécurité vs Anonymat](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Surveillance de masse](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Capitalisme de surveillance](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types de réseaux de communication :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Messageries instantanées chiffrées
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** est un groupe de serveurs gérés par des bénévoles qui vous permet de vous connecter gratuitement et d'améliorer votre confidentialité et votre sécurité sur Internet. Les particuliers et les organisations peuvent également partager des informations sur le réseau Tor avec des "services cachés .onion" sans compromettre leur vie privée. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure.
|
||||
|
||||
[Introduction détaillée de Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: סקירה כללית של מספר ארכיטקטורות רשת
|
||||
|
||||
ישנן מספר ארכיטקטורות רשת הנפוצות להעברת הודעות בין אנשים. רשתות אלו יכולות לספק הבטחות פרטיות שונות, וזו הסיבה שכדאי לקחת בחשבון את [מודל האיום](../basics/threat-modeling.md) שלך בעת ההחלטה באיזו אפליקציה להשתמש.
|
||||
|
||||
[מסנג'רים (הודעות מיידיות) מומלצות](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## רשתות מרכזיות
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor היא רשת מבוזרת בחינם לשימוש המיועד
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. בשימוש נכון, הרשת מאפשרת גלישה ותקשורת פרטית ואנונימית. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
רשתות וירטואליות פרטיות הן דרך להרחיב את הקצה של הרשת שלך ליציאה למקום אחר בעולם.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
בדרך כלל, ספק שירותי אינטרנט יכול לראות את זרימת תעבורת האינטרנט הנכנסת ויוצאת ממכשיר סיום הרשת שלך (כלומר מודם). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ description: בעידן המודרני של ניצול נתונים דיגיטל
|
||||
|
||||
אנשים רבים מבלבלים את המושגים של פרטיות, אבטחה ואנונימיות. אנשים רבים מבלבלים את המושגים של **פרטיות**, **אבטחה** ו**אנונימיות**. אתה תראה אנשים מבקרים מוצרים שונים כ"לא פרטיים" כאשר הם באמת מתכוונים שזה לא מספק אנונימיות, למשל. באתר זה אנו מכסים את כל שלושת הנושאים הללו, אך חשוב שתבינו את ההבדל ביניהם, ומתי כל אחד מהם נכנס לפעולה.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**פרטיות**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ description: בעידן המודרני של ניצול נתונים דיגיטל
|
||||
|
||||
פרטיות היא משהו שאנחנו צריכים להכניס ל[תוכנות ובשירותים](../tools.md) שבהם אנו משתמשים כברירת מחדל, אתה לא יכול לכופף את רוב האפליקציות להיות פרטיות בעצמך.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## מקורות
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. הם פועלים מאז 2014. Mailbox.org ממוקם בברלין, גרמניה. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## אודות Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. אתה תראה אנשים מבקרים מוצרים שונים כ"לא פרטיים" כאשר הם באמת מתכוונים שזה לא מספק אנונימיות, למשל. באתר זה אנו מכסים את כל שלושת הנושאים הללו, אך חשוב שתבינו את ההבדל ביניהם, ומתי כל אחד מהם נכנס לפעולה.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: מעקב המוני](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: קפיטליזם מעקב](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[סוגי רשתות תקשורת :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## מסנג'רים מוצפנים
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. אנשים וארגונים יכולים גם לשתף מידע על גבי רשת Tor עם ".onion hidden services" מבלי לפגוע בפרטיותם. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה.
|
||||
|
||||
[סקירת Tor מפורטת :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we
|
||||
|
||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Privacy**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tip</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: Azonnali üzenetküldő alkalmazások által gyakran használt kül
|
||||
|
||||
Személyek közötti üzenetek továbbítására többféle hálózati architektúra használható. Ezek a hálózatok különböző magánéleti garanciákat nyújthatnak, ezért érdemes figyelembe venned a [védelmk modelledet](../basics/threat-modeling.md), amikor eldöntöd, hogy melyik alkalmazást fogod használni.
|
||||
|
||||
[Ajánlott Azonnali Üzenetküldők](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Központosított Hálózatok
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Honlap}
|
||||
|
||||
@@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||
|
||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button}
|
||||
|
||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||
|
||||
Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it.
|
||||
|
||||
@@ -12,6 +12,8 @@ A magánélet végső soron az emberi információkról szól, és ez azért fon
|
||||
|
||||
Sokan összekeverik az **adatvédelem**, az **adatbiztonság** és az **anonimitás** fogalmát. Láthatod, hogy emberek kritizálnak különböző termékeket, mint "nem privát", amikor valójában úgy értik, hogy nem biztosít anonimitást például. Ezen a weboldalon mindhárom témakörrel foglalkozunk, de fontos, hogy megértsd a köztük lévő különbséget, és hogy mikor melyik kerül a képbe.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button}
|
||||
|
||||
<!-- markdownlint-disable-next-line -->
|
||||
**Adatvédelem**
|
||||
:
|
||||
@@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||
|
||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
|
||||
## Sources
|
||||
|
||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
||||
|
||||
+4
-74
@@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
<div markdown>
|
||||
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations.
|
||||
|
||||
[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary }
|
||||
[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" }
|
||||
|
||||
</div>
|
||||
|
||||
- [x] **Ad-Free Recommendations**
|
||||
@@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
||||
|
||||
</div>
|
||||
|
||||
### Top 3 Private Email Providers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Proton Mail**
|
||||
|
||||
---
|
||||
|
||||
Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#proton-mail)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy } **Mailbox.org**
|
||||
|
||||
---
|
||||
|
||||
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. 2014 óta működnek. A Mailbox.org székhelye Berlinben, Németországban található. Accounts start with up to 2 GB storage, which can be upgraded as needed.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg)
|
||||
|
||||
- { .lg .middle .twemoji loading=lazy }{ .lg .middle .twemoji loading=lazy } **Tuta**
|
||||
|
||||
---
|
||||
|
||||
Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.
|
||||
|
||||
[:octicons-arrow-right-24: Read Full Review](email.md#tuta)
|
||||
|
||||
</div>
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
### Best VPN Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn)
|
||||
- { .twemoji loading=lazy } [IVPN](vpn.md#ivpn)
|
||||
- { .twemoji loading=lazy } [Mullvad](vpn.md#mullvad)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Secure Cloud Storage Services
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive)
|
||||
- { .twemoji loading=lazy } [Tresorit](cloud.md#tresorit)
|
||||
- { .twemoji loading=lazy } [Peergos](cloud.md#peergos)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div markdown>
|
||||
### Best Web Browsers
|
||||
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser)
|
||||
- { .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox)
|
||||
- { .twemoji loading=lazy } [Brave](desktop-browsers.md#brave)
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" }
|
||||
[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button}
|
||||
|
||||
---
|
||||
|
||||
## About Privacy Guides
|
||||
@@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V
|
||||
|
||||
As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge.
|
||||
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button}
|
||||
[:material-information: More About Who We Are](about.md){ class="md-button" }
|
||||
|
||||
<div class="grid" markdown>
|
||||
<div markdown>
|
||||
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||
|
||||
Many people get the concepts of privacy, security, and anonymity confused. Láthatod, hogy emberek kritizálnak különböző termékeket, mint "nem privát", amikor valójában úgy értik, hogy nem biztosít anonimitást például. Ezen a weboldalon mindhárom témakörrel foglalkozunk, de fontos, hogy megértsd a köztük lévő különbséget, és hogy mikor melyik kerül a képbe.
|
||||
|
||||
[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" }
|
||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
||||
</div>
|
||||
</div>
|
||||
|
||||
@@ -13,9 +13,9 @@ cover: real-time-communication.webp
|
||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||
|
||||
These are our recommendations for encrypted **real-time communication**.
|
||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||
|
||||
[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
|
||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Encrypted Messengers
|
||||
|
||||
|
||||
+1
-1
@@ -31,7 +31,7 @@ schema:
|
||||
|
||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. A magánszemélyek és szervezetek a Tor-hálózaton keresztül a ".onion rejtett szolgáltatásokkal" is megoszthatnak információkat anélkül, hogy veszélyeztetnék a magánéletüket. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére.
|
||||
|
||||
[Részletes Tor áttekintés :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
|
||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">Tanács</p>
|
||||
|
||||
@@ -6,7 +6,7 @@ description: Ikhtisar tentang beberapa arsitektur jaringan yang biasa digunakan
|
||||
|
||||
Ada beberapa arsitektur jaringan yang biasa digunakan untuk menyampaikan pesan antar orang. Jaringan ini dapat memberikan jaminan privasi yang berbeda, itulah sebabnya mengapa perlu mempertimbangkan [model ancaman](../basics/threat-modeling.md) Anda ketika memutuskan aplikasi mana yang akan digunakan.
|
||||
|
||||
[Perpesanan Instan yang Direkomendasikan](../real-time-communication.md ""){.md-button}
|
||||
[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button}
|
||||
|
||||
## Jaringan Terpusat
|
||||
|
||||
|
||||
@@ -8,6 +8,8 @@ description: Tor adalah jaringan terdesentralisasi yang gratis untuk digunakan,
|
||||
|
||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Jika digunakan dengan benar, jaringan ini memungkinkan penjelajahan dan komunikasi secara privat dan anonim. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif.
|
||||
|
||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}
|
||||
|
||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda.
|
||||
|
||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user