1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-16 07:51:13 +00:00
i18n/i18n/zh/tools.md
2025-03-08 12:39:53 +00:00

34 KiB
Raw Blame History

meta_title, title, icon, hide, description
meta_title title icon hide description
Ad-Free Privacy Tool/Service Recommendations - Privacy Guides 隐私工具 资料/工具
toc
A complete list of the privacy tools, services, software, and hardware recommended by the Privacy Guides community.

如果你正在寻找某项具体解决方案,这里是一些我们推荐的各种类别的软硬件工具。 我们推荐的隐私工具主要依据它们的安全功能来选择,另外还强调了去中心化和开源。 They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

VPN Providers{.md-button} Password Managers{.md-button} Email Providers{.md-button} Browser Extensions{.md-button} DNS Servers{.md-button} Email Aliasing Services{.md-button} Photo Organization Tools{.md-button}

If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our forum or our Matrix community!

关于每个项目的更多相关细节, 为什么选择它们以及我们提议的一些额外的使用提示或技巧,请点击每个部分的 "了解详情" 链接, 或者也可以点击推荐项本身来转到具体的页面部分。

- [x] **Ad-Free Recommendations** - [x] **Frequent Updates** - [x] **Trusted by Readers**
- [x] **Complete Editorial Independence** - [x] **Open-Source Contributions** - [x] **Trusted by Journalists**

Private Web Browsers

Tor Browser logo{ align=left }

Tor Browser (Desktop & Android) is the top choice if you need anonymity, as it provides you with access to the Tor network, a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 个人和组织也可以通过Tor网络与".onion隐藏服务"分享信息,而不损害其隐私。 由于Tor流量难以阻止和跟踪因此Tor是一种有效的审查规避工具。

Read Our Full Review :material-arrow-right-drop-circle:{ .md-button .md-button--primary }

### Browser Extensions
### More Tor Network Tools

Top 3 Private VPN Providers

VPNs do not provide anonymity

Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.

If you are looking for anonymity, you should use the Tor Browser.

If you're looking for added security, you should always ensure you're connecting to websites using HTTPS. VPN不是良好安全实践的替代品。

了解更多 :hero-arrow-circle-right-fill:

Top 3 Private Email Providers

  • Proton Mail logo{ .lg .middle .twemoji } Proton Mail


    Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.

    Read Full Review :material-arrow-right-drop-circle:

  • Mailbox.org logo{ .lg .middle .twemoji } Mailbox.org


    Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. 他们自2014年以来一直在运作。 Mailbox.org总部位于德国柏林。 Accounts start with up to 2 GB storage, which can be upgraded as needed.

    Read Full Review :material-arrow-right-drop-circle:

  • Tuta logo{ .lg .middle .twemoji }Tuta logo{ .lg .middle .twemoji } Tuta


    Tuta (formerly Tutanota) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.

    Read Full Review :material-arrow-right-drop-circle:

### Email Aliasing Services
### Self-Hosting Email

Secure Email Clients

了解更多 :hero-arrow-circle-right-fill:

More Private Service Providers

路由器固件

了解更多 :hero-arrow-circle-right-fill:

Data Removal Services

了解更多 :hero-arrow-circle-right-fill:

云存储

加密DNS代理

We recommend a number of encrypted DNS servers based on a variety of criteria, such as Mullvad and Quad9 amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended.

了解更多 :hero-arrow-circle-right-fill:

Encrypted DNS Proxies

了解更多 :hero-arrow-circle-right-fill:

Self-hosted Solutions

了解更多 :hero-arrow-circle-right-fill:

Financial Services

Payment Masking Services

  • Privacy.com logo{ .twemoji loading=lazy }Privacy.com logo{ .twemoji loading=lazy } Privacy.com
  • MySudo logo{ .twemoji loading=lazy }MySudo logo{ .twemoji loading=lazy } MySudo

了解更多 :hero-arrow-circle-right-fill:

Online Gift Card Marketplaces

了解更多 :hero-arrow-circle-right-fill:

Photo Management

  • Ente logo{ .twemoji loading=lazy }Ente logo{ .twemoji loading=lazy } Ente Photos
  • Stingle logo{ .twemoji loading=lazy }Stingle logo{ .twemoji loading=lazy } Stingle
  • PhotoPrism logo{ .twemoji loading=lazy } PhotoPrism

了解更多 :hero-arrow-circle-right-fill:

Search Engines

了解更多 :hero-arrow-circle-right-fill:

Software

AI Chat

了解更多 :hero-arrow-circle-right-fill:

VPN供应商

  • Tuta logo{ .twemoji loading=lazy }Tuta logo{ .twemoji loading=lazy } Tuta
  • Proton Calendar logo{ .twemoji loading=lazy } Proton Calendar

了解更多 :hero-arrow-circle-right-fill:

Cryptocurrency

  • Monero logo{ .twemoji loading=lazy } Monero

了解更多 :hero-arrow-circle-right-fill:

Data and Metadata Redaction

了解更多 :hero-arrow-circle-right-fill:

Document Collaboration

了解更多 :hero-arrow-circle-right-fill:

加密软件

Operating System Encryption

For encrypting your OS drive, we typically recommend using the encryption tool your operating system provides, whether that is BitLocker on Windows, FileVault on macOS, or LUKS on Linux. These tools are included with the operating system and take advantage of hardware encryption elements such as a secure cryptoprocessor.

了解更多 :hero-arrow-circle-right-fill:

Cross-platform Tools

了解更多 :hero-arrow-circle-right-fill:

OpenPGP Clients

了解更多 :hero-arrow-circle-right-fill:

加密软件

了解更多 :hero-arrow-circle-right-fill:

文件共享

了解更多 :hero-arrow-circle-right-fill:

Health and Wellness Apps

了解更多 :hero-arrow-circle-right-fill:

Language Tools

  • LanguageTool logo{ .twemoji loading=lazy }LanguageTool logo{ .twemoji loading=lazy } LanguageTool

了解更多 :hero-arrow-circle-right-fill:

Maps and Navigation Apps

了解更多 :hero-arrow-circle-right-fill:

数据和元数据处理

Note: Hardware security keys have been moved to their own category.

了解更多 :hero-arrow-circle-right-fill:

多因素认证工具

了解更多 :hero-arrow-circle-right-fill:

Notebooks

了解更多 :hero-arrow-circle-right-fill:

Office Suites

了解更多 :hero-arrow-circle-right-fill:

生产力工具

了解更多 :hero-arrow-circle-right-fill:

Pastebins

了解更多 :hero-arrow-circle-right-fill:

实时通讯

了解更多 :hero-arrow-circle-right-fill:

Hardware

Security Keys

了解更多 :hero-arrow-circle-right-fill:

Mobile Phones

了解更多 :hero-arrow-circle-right-fill:

服务供应商

Android

Custom Android Operating Systems

  • GrapheneOS logo{ .twemoji loading=lazy }GrapheneOS logo{ .twemoji loading=lazy } GrapheneOS

了解更多 :hero-arrow-circle-right-fill:

Android Apps

了解更多 :hero-arrow-circle-right-fill:

Ways to Obtain Android Apps

了解更多 :hero-arrow-circle-right-fill:

Android 应用

了解更多 :hero-arrow-circle-right-fill:

Router Firmware

  • OpenWrt logo{ .twemoji loading=lazy }OpenWrt logo{ .twemoji loading=lazy } OpenWrt
  • OPNsense logo{ .twemoji loading=lazy } OPNsense

了解更多 :hero-arrow-circle-right-fill:

Advanced Tools

These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively.

Alternative Networks

  • I2P logo{ .twemoji loading=lazy } I2P logo{ .twemoji loading=lazy } I2P
  • Tor logo{ .twemoji loading=lazy } Tor
  • Snowflake logo{ .twemoji loading=lazy }Snowflake logo{ .twemoji loading=lazy } Snowflake

了解更多 :hero-arrow-circle-right-fill:

Device Integrity Verification

了解更多 :hero-arrow-circle-right-fill: