1
1
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2026-05-24 20:31:19 +00:00

style!: Remove all mkdocs-material icon references

This commit is contained in:
2026-05-18 17:55:18 -05:00
parent 52d2965b0b
commit 26607bf4dd
68 changed files with 575 additions and 614 deletions
+2 -2
View File
@@ -26,8 +26,8 @@ This section will progressively grow with more tools to support the community in
<div class="toolbox-button-grid" markdown>
[:fontawesome-solid-toolbox:{ .toolbox-button-icon } Privacy Activist Toolbox](toolbox/_index.md){ .toolbox-button .toolbox-bg }
[Privacy Activist Toolbox](toolbox/_index.md){ .toolbox-button .toolbox-bg }
[:fontawesome-solid-address-card:{ .toolbox-button-icon } DPA Directory](legal/dpa-directory/){ .toolbox-button .dpadirectory-bg }
[DPA Directory](legal/dpa-directory/){ .toolbox-button .dpadirectory-bg }
</div>
+64 -64
View File
@@ -40,17 +40,17 @@ Additionally, this table provides information about each law, authority, contact
<div class="toolbox-button-grid" markdown>
[:fontawesome-solid-earth-africa:{ .toolbox-button-icon } Africa](#africa){ .toolbox-button .dpadirectory-button .dpadirectory-button-africa }
[Africa](#africa){ .toolbox-button .dpadirectory-button .dpadirectory-button-africa }
[:fontawesome-solid-earth-asia:{ .toolbox-button-icon } Asia](#asia){ .toolbox-button .dpadirectory-button .dpadirectory-button-asia }
[Asia](#asia){ .toolbox-button .dpadirectory-button .dpadirectory-button-asia }
[:fontawesome-solid-earth-europe:{ .toolbox-button-icon } Europe](#europe){ .toolbox-button .dpadirectory-button .dpadirectory-button-europe }
[Europe](#europe){ .toolbox-button .dpadirectory-button .dpadirectory-button-europe }
[:fontawesome-solid-earth-america:{ .toolbox-button-icon } North America](#north-america){ .toolbox-button .dpadirectory-button .dpadirectory-button-northamerica }
[North America](#north-america){ .toolbox-button .dpadirectory-button .dpadirectory-button-northamerica }
[:fontawesome-solid-earth-oceania:{ .toolbox-button-icon } Oceania](#oceania){ .toolbox-button .dpadirectory-button .dpadirectory-button-oceania }
[Oceania](#oceania){ .toolbox-button .dpadirectory-button .dpadirectory-button-oceania }
[:fontawesome-solid-earth-america:{ .toolbox-button-icon } South America](#south-america){ .toolbox-button .dpadirectory-button .dpadirectory-button-southamerica }
[South America](#south-america){ .toolbox-button .dpadirectory-button .dpadirectory-button-southamerica }
</div>
@@ -65,149 +65,149 @@ Additionally, this table provides information about each law, authority, contact
<!-- Table header -->
<thead>
<tr role="row">
<th role="column">Region</th>
<th role="column" class="table-large-cell">Privacy Law</th>
<th role="column">Abbreviation</th>
<th role="column" class="table-large-cell">DPA</th>
<th role="column">Contact</th>
<th role="column">Complaint</th>
</tr>
<tr role="row">
<th role="column">Region</th>
<th role="column" class="table-large-cell">Privacy Law</th>
<th role="column">Abbreviation</th>
<th role="column" class="table-large-cell">DPA</th>
<th role="column">Contact</th>
<th role="column">Complaint</th>
</tr>
</thead>
<tbody role="rowgroup">
<!-- Egypt -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Egypt</td>
<td data-cell="Law" role="cell"><a href="https://pdpc.gov.eg/assets/pdf-data/PDPL%20no.%20151%20of%202020%20(ar).pdf" target="_blank">
Personal Data Protection Law No. 151/2020
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">PDPL</td>
<td data-cell="DPA" role="cell"><a href="https://pdpc.gov.eg" target="_blank">
Personal Data Protection Center (PDPC)
</a></td>
<td data-cell="Contact" role="cell">TBA</td>
<td data-cell="Complaint" role="cell">TBA</td>
</tr>
</a></td>
<td data-cell="Contact" role="cell">TBA</td>
<td data-cell="Complaint" role="cell">TBA</td>
</tr>
<!-- Ghana -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Ghana</td>
<td data-cell="Law" role="cell"><a href="https://dataprotection.org.gh/for-individuals/" target="_blank">
Data Protection Act of 2012
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">Act 843</td>
<td data-cell="DPA" role="cell"><a href="https://dataprotection.org.gh/" target="_blank">
Data Protection Commission (DPC)
</a></td>
Data Protection Commission (DPC)
</a></td>
<td data-cell="Contact" role="cell"><a href="https://dataprotection.org.gh/contact/" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://dataprotection.org.gh/file-a-complaint/" target="_blank">Complaint Link</a></td>
</tr>
</tr>
<!-- Kenya -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Kenya</td>
<td data-cell="Law" role="cell"><a href="https://www.odpc.go.ke/data-protection-laws-kenya/" target="_blank">
Data Protection Act, 2019
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">The Act</td>
<td data-cell="DPA" role="cell"><a href="https://www.odpc.go.ke/" target="_blank">
Office of the Data Protection Commissioner (ODPC)
</a></td>
</a></td>
<td data-cell="Contact" role="cell"><a href="https://www.odpc.go.ke/contact-us/" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://cie.odpc.go.ke/" target="_blank">Complaint Link</a></td>
</tr>
</tr>
<!-- Morocco -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Morocco</td>
<td data-cell="Law" role="cell"><a href="https://www.cndp.ma/loi-09-08/" target="_blank">
Law No. 09-08 on the protection of individuals with regard to the processing of personal data
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">Law 09-08</td>
<td data-cell="DPA" role="cell"><a href="https://www.cndp.ma" target="_blank">
National Commission for the Protection of Personal Data (CNDP)
</a></td>
</a></td>
<td data-cell="Contact" role="cell"><a href="https://www.cndp.ma/contact/" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://www.cndp.ma/deposer-une-plainte/" target="_blank">Complaint Link</a></td>
</tr>
</tr>
<!-- Nigeria -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Nigeria</td>
<td data-cell="Law" role="cell"><a href="https://ndpc.gov.ng/wp-content/uploads/2025/07/NDP-ACT-GAID-2025-MARCH-20TH.pdf" target="_blank">
Nigeria Data Protection Act
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">NDP</td>
<td data-cell="DPA" role="cell"><a href="https://ndpc.gov.ng/" target="_blank">
Nigeria Data Protection Commission (NDPC)
</a></td>
</a></td>
<td data-cell="Contact" role="cell"><a href="https://ndpc.gov.ng/contact/" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://services.ndpc.gov.ng/breach/" target="_blank">Complaint Link</a></td>
</tr>
</tr>
<!-- Senegal -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Senegal</td>
<td data-cell="Law" role="cell"><a href="https://stcc-ssi.sn/wp-content/uploads/2025/03/protection-des-donnees-personnelles.pdf" target="_blank">
Loi n° 2008-12 du 25 janvier 2008 portant protection des données à caractère personnel
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">Loi no. 2008-12</td>
<td data-cell="DPA" role="cell"><a href="https://www.cdp.sn/" target="_blank">
Commission de Protection des Données Personnelles (CDP)
</a></td>
</a></td>
<td data-cell="Contact" role="cell"><a href="https://www.cdp.sn/contact" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://www.cdp.sn/plainte" target="_blank">Complaint Link</a></td>
</tr>
</tr>
<!-- South Africa -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">South Africa</td>
<td data-cell="Law" role="cell"><a href="https://inforegulator.org.za/wp-content/uploads/2025/08/PROTECTION-OF-PERSONAL-INFORMATION-ACT-4-OF-2013.pdf" target="_blank">
Protection of Personal Information Act, 2013
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">POPIA</td>
<td data-cell="DPA" role="cell"><a href="https://inforegulator.org.za/" target="_blank">
Information Regulator
</a></td>
</a></td>
<td data-cell="Contact" role="cell"><a href="https://inforegulator.org.za/contact-us/" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://inforegulator.org.za/complaints/" target="_blank">Complaint Link</a></td>
</tr>
</tr>
<!-- Tanzania -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Tanzania</td>
<td data-cell="Law" role="cell"><a href="https://www.pdpc.go.tz/media/media/THE_PERSONAL_DATA_PROTECTION_ACT.pdf" target="_blank">
Personal Data Protection Act
</a></td>
<td data-cell="Abbreviation" role="cell">-</td>
Personal Data Protection Act
</a></td>
<td data-cell="Abbreviation" role="cell">-</td>
<td data-cell="DPA" role="cell"><a href="https://www.pdpc.go.tz/en/" target="_blank">
Personal Data Protection Commission (PDPC)
</a></td>
Personal Data Protection Commission (PDPC)
</a></td>
<td data-cell="Contact" role="cell"><a href="https://www.pdpc.go.tz/en/data-alliance/alliances/" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://dataprotection.pdpc.go.tz/complaint-form-one" target="_blank">Complaint Link</a></td>
</tr>
</tr>
<!-- Tunisia -->
<tr role="row">
<tr role="row">
<td data-cell="Region" role="rowheader">Tunisia</td>
<td data-cell="Law" role="cell"><a href="https://www.inpdp.tn/ressources/loi_2004.pdf" target="_blank">
Organic Act n° 2004-63 of July 27th 2004 on the protection of personal data
</a></td>
</a></td>
<td data-cell="Abbreviation" role="cell">Organic Act No. 2004-63</td>
<td data-cell="DPA" role="cell"><a href="https://www.inpdp.tn/" target="_blank">
National Authority for Protection of Personal Data (INPDP)
</a></td>
</a></td>
<td data-cell="Contact" role="cell"><a href="https://www.inpdp.tn/contact.html" target="_blank">Contact Page</a></td>
<td data-cell="Complaint" role="cell"><a href="https://www.inpdp.tn/Formulaires.html" target="_blank">Complaint Link</a></td>
</tr>
</tr>
</tbody>
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu :material-map-search:](#the-directory)</button>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### Asia
@@ -374,7 +374,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu :material-map-search:](#the-directory)</button>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### Europe
@@ -933,7 +933,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu :material-map-search:](#the-directory)</button>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### North America
@@ -956,7 +956,7 @@ Additionally, this table provides information about each law, authority, contact
<tbody role="rowgroup">
<!-- Canada -->
<!-- Canada -->
<tr role="row">
<td data-cell="Region" role="rowheader">Canada</td>
<td data-cell="Law" role="cell"><a href="https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/" target="_blank">
@@ -1310,7 +1310,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu :material-map-search:](#the-directory)</button>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### Oceania
@@ -1321,7 +1321,7 @@ Additionally, this table provides information about each law, authority, contact
<!-- Table header -->
<thead>
<tr role="row">
<tr role="row">
<th role="column">Region</th>
<th role="column" class="table-large-cell">Privacy Law</th>
<th role="column">Abbreviation</th>
@@ -1365,7 +1365,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu :material-map-search:](#the-directory)</button>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### South America
@@ -1462,7 +1462,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu :material-map-search:](#the-directory)</button>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
## Additional resources
+44 -69
View File
@@ -9,7 +9,7 @@ The **Privacy Activist Toolbox** is a resource for anyone interested in becoming
This page is also a resource to help digital rights organizations that would like to expand their work focusing on privacy.
:material-cursor-default-click: By clicking on any of the tips listed on this page, you can access more information on each topic, as well as additional resources to support your advocacy.
By clicking on any of the tips listed on this page, you can access more information on each topic, as well as additional resources to support your advocacy.
---
@@ -17,23 +17,23 @@ This page is also a resource to help digital rights organizations that would lik
<div class="toolbox-button-grid" markdown>
[:fontawesome-solid-scale-balanced:{ .toolbox-button-icon } Check<br>Your Laws](#check-your-laws){ .toolbox-button .toolbox-bg-legal }
[Check<br>Your Laws](#check-your-laws){ .toolbox-button .toolbox-bg-legal }
[:fontawesome-solid-toolbox:{ .toolbox-button-icon } Choose<br>Your Tools](#choose-your-tools){ .toolbox-button .toolbox-bg-tools }
[Choose<br>Your Tools](#choose-your-tools){ .toolbox-button .toolbox-bg-tools }
[:fontawesome-solid-users-rays:{ .toolbox-button-icon } Expand Your<br>Perspective](#expand-your-perspective){ .toolbox-button .toolbox-bg-perspective }
[Expand Your<br>Perspective](#expand-your-perspective){ .toolbox-button .toolbox-bg-perspective }
[:fontawesome-solid-hands-holding-circle:{ .toolbox-button-icon } Support The<br>Community](#support-the-community){ .toolbox-button .toolbox-bg-community }
[Support The<br>Community](#support-the-community){ .toolbox-button .toolbox-bg-community }
[:fontawesome-solid-handshake-angle:{ .toolbox-button-icon } Build<br>Alliances](#build-alliances){ .toolbox-button .toolbox-bg-alliances }
[Build<br>Alliances](#build-alliances){ .toolbox-button .toolbox-bg-alliances }
[:fontawesome-solid-heart-circle-check:{ .toolbox-button-icon } Make It<br>Accessible](#make-it-accessible){ .toolbox-button .toolbox-bg-accessibility }
[Make It<br>Accessible](#make-it-accessible){ .toolbox-button .toolbox-bg-accessibility }
[:fontawesome-solid-star:{ .toolbox-button-icon } Uphold<br>Integrity](#uphold-integrity){ .toolbox-button .toolbox-bg-integrity }
[Uphold<br>Integrity](#uphold-integrity){ .toolbox-button .toolbox-bg-integrity }
[:fontawesome-solid-heart:{ .toolbox-button-icon } Stay<br>Persistent](#stay-persistent){ .toolbox-button .toolbox-bg-persistence }
[Stay<br>Persistent](#stay-persistent){ .toolbox-button .toolbox-bg-persistence }
[:fontawesome-solid-hand-fist:{ .toolbox-button-icon } Take<br>Action!](#take-action){ .toolbox-button .toolbox-bg-action }
[Take<br>Action!](#take-action){ .toolbox-button .toolbox-bg-action }
</div>
@@ -50,8 +50,7 @@ This page is also a resource to help digital rights organizations that would lik
Being well-informed about the data protection regulations in your own jurisdiction can be a significant asset for your personal and collective battles to improve privacy, for yourself and for others. Learn more about what to look for when researching your local privacy laws.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -65,13 +64,12 @@ Learn More :material-arrow-right-drop-circle:
Once you become informed on your local privacy laws, get familiar with the process to report violations. Submitting an official complaint is often simple, and can have a significant impact for yourself and your community. Learn more about why and how you should report violations of your local privacy laws.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Choose Your Tools
@@ -85,8 +83,7 @@ Learn More :material-arrow-right-drop-circle:
In your privacy advocacy, it's essential to use and recommend tools that reliably protect privacy. For this, you need to investigate and remain highly skeptical of any dangerous or unproven marketing claims. Learn more about how to evaluate privacy claims and recommend tools that are trustworthy.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -100,8 +97,7 @@ Learn More :material-arrow-right-drop-circle:
As privacy activists, it's important to not only support the tools and organizations with good privacy practices, but to also lead by example when it comes to moving away from the surveillance ecosystem. Learn more about why and how to move away from "Big Tech" and embrace alternatives.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -115,13 +111,12 @@ Learn More :material-arrow-right-drop-circle:
Commercial social media platforms represent one of the biggest sources of data exploitation. By staying active on these platforms we continue to feed the beast, and indirectly support their invasion of our privacy rights. Learn more about how to minimize your presence there, and slowly build better social networks.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Expand Your Perspective
@@ -135,8 +130,7 @@ Learn More :material-arrow-right-drop-circle:
When we think about our privacy, we often focus on the technical tools we can use. While this is indeed an important component, it's crucial not to lose sight of how regulations and invasive practices impact us collectively. Learn more about how to expand your perspective on data privacy.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -150,8 +144,7 @@ Learn More :material-arrow-right-drop-circle:
Privacy isn't just about the tools, the laws, or the practices of any individual or organization. To move our society in a place where everyone benefits from privacy by default, we must consider technologies, laws, and culture holistically. Learn more about remembering to consider the whole landscape.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -165,13 +158,12 @@ Learn More :material-arrow-right-drop-circle:
Everyone has different needs and faces different dangers when their personal data is exposed. To give actionable privacy advice and recommendations, it's essential to keep in mind everyone's unique situation. Learn more about better evaluating each person's threat model.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Support The Community
@@ -185,8 +177,7 @@ Learn More :material-arrow-right-drop-circle:
At times, it might feel like the privacy community is niche and isolated. The battle for privacy rights is difficult, and its defenders are often scattered. This is why it's essential that we support and uplift each other at every opportunity. Learn more about how to lift your allies up and grow the movement.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -200,8 +191,7 @@ Learn More :material-arrow-right-drop-circle:
Fighting for privacy rights is a collective endeavor. You cannot do it alone. Anyone around you contributing is fighting the same battle by your side. This battle can be difficult and isolating at time. This is why it's critical to care for each other. Learn more about how you can support your privacy comrades.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div></a>
@@ -214,13 +204,12 @@ Learn More :material-arrow-right-drop-circle:
Kindness is essential for privacy advocates. To grow our movement, we must meet people from a place of camaraderie. People don't change their mind by being berated. However, this isn't true for institutions. Learn more about how to integrate kindness in your work, while being relentless with institutions.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Build Alliances
@@ -234,8 +223,7 @@ Learn More :material-arrow-right-drop-circle:
The privacy community consists of a patchwork of individuals and organizations that sometimes hold quite different views. When these divergences lead to infighting, we need to ask how these internal wars are impacting our community negatively. Learn more about how to start alliances instead of wars.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -249,8 +237,7 @@ Learn More :material-arrow-right-drop-circle:
In privacy, like everywhere else, diversity is a strength. If you want your community to have a broad understanding of threat models, and be able to fight on multiple levels, you need to value a diversity of expertises. Learn more about recognizing, respecting, and retaining experts with skills different to yours.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -264,13 +251,12 @@ Learn More :material-arrow-right-drop-circle:
To succeed, we must support each other. A good way to do this is to never forget to give credit where credit is due. When another advocate or organization says something you agree with, boost them up, spread their reach, and thank them publicly. Learn more about making your allies feel seen and valued.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Make It Accessible
@@ -284,8 +270,7 @@ Learn More :material-arrow-right-drop-circle:
For our privacy rights movement to grow, we must bring more people in. To accomplish this, it's fundamental to discuss privacy in ways that are accessible to newcomers who aren't familiar with basic concepts yet. Learn more about improving your advocacy work to make it more approachable to beginners.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -299,8 +284,7 @@ Learn More :material-arrow-right-drop-circle:
Inclusivity is not only the right thing to do, it's also essential to grow our movement. If we want privacy rights to succeed, it's imperative that we build communities where *everyone* feels safe and welcomed, regardless of who they are. Learn more about keeping your communications and communities inclusive.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -314,8 +298,7 @@ Learn More :material-arrow-right-drop-circle:
Accessibility is indispensable to inclusivity, and should always be a priority in our work. To make our privacy communities welcoming to all, accessibility cannot be an afterthought. We must integrate it in our practice from the start. Learn more about improving the accessibility of your privacy work.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -329,13 +312,12 @@ Learn More :material-arrow-right-drop-circle:
If you are developing a privacy-focused application or website, do not neglect the design aspect of it. This is a common mistake that can have a significant negative impact on adoption by a general audience. Learn more about making your design appealing and accessible to all. Make it cute!
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Uphold Integrity
@@ -349,8 +331,7 @@ Learn More :material-arrow-right-drop-circle:
As privacy advocates and activists, it's important to be a voice for resistance and take a stand against abusive practices. One substantial way to do this is to refuse to participate in privacy-intrusive requests, or use invasive software. Learn more about refusing to comply with privacy-abusive practices.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -364,8 +345,7 @@ Learn More :material-arrow-right-drop-circle:
If you manage a digital rights group or organization, make sure you aren't subjecting your contributors to the very privacy-invasive tech you're fighting against. Sadly, it's not rare to see communities that aren't following their own advice for internal practices. Learn more about the importance of maintaining integrity *internally* as well as externally.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -379,13 +359,12 @@ Learn More :material-arrow-right-drop-circle:
Through your privacy work, be careful to never collect or share the data of others without their explicit consent. It's crucial to protect your allies' data in all that you do, whether that's individual action or organizational leadership. Learn more about safeguarding the data of your privacy comrades.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Stay Persistent
@@ -399,8 +378,7 @@ Learn More :material-arrow-right-drop-circle:
There is so much to do in the movement for better privacy rights. So much, that it's sometimes easy to feel discouraged when facing the scale of what's left to accomplish. But everything helps, and even the smallest action counts. Learn more about why every action and every victory matters, no matter how small.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -414,13 +392,12 @@ Learn More :material-arrow-right-drop-circle:
The battle for privacy rights will be a long one. This isn't a sprint, it's a marathon. If you want to be a good advocate, you *must* take the time to rest when needed. Burning out isn't an option, we cannot afford to lose your precious contribution! Learn more about why it's fundamental to learn to rest when you need it.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
## Take Action!
@@ -434,8 +411,7 @@ Learn More :material-arrow-right-drop-circle:
Once you have the knowledge, motivation, and energy, it's time to act! Perhaps you've read all of these tips, or read through our Knowledge Base already! But you don't need to know that much about privacy to start contributing. Learn more about how to start being a privacy activist.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
@@ -449,11 +425,10 @@ Learn More :material-arrow-right-drop-circle:
If you've been a privacy advocate for a while, maybe it's time to level up and grow as a leader in your community. Becoming a leader can mean starting a local group, or initiating bigger projects online. Learn more about how to become a *good* leader in the privacy rights movement.
Learn More :material-arrow-right-drop-circle:
{align=right}
Learn More {align=right}
</div>
</a>
<button class="toolbox-button-top">[Back to top :material-toolbox:](#toolbox-compartments)</button>
<button class="toolbox-button-top">[Back to top](#toolbox-compartments)</button>
<br>
@@ -76,7 +76,7 @@ Here are a few ideas of actions you might want to consider in your privacy work:
@counter-style emoji-list-a {
system: fixed;
symbols: "🙌" "🔍" "✊" "✍️" "📃" "🗣️" "🎞️" "📖" "💛" "📚";
suffix: " ";
suffix: " ";
</style>
<div class="emoji-list-a" markdown>
@@ -118,8 +118,8 @@ Here are a few privacy-focused tools and services that can help you to organize
:page_with_curl: Use it as an alternative to Google Docs!
[More info](../../../tools/software/document-collaboration/index.md#cryptpad)
[:octicons-home-16:](https://cryptpad.fr/)
[:octicons-feed-star-16:](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/)
[Homepage](https://cryptpad.fr/)
[Review](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/)
{ .pg:buttons }
</div>
@@ -133,8 +133,8 @@ Here are a few privacy-focused tools and services that can help you to organize
:speech_balloon: Use it as an [alternative](../tip-improve-your-social-media-and-build-resilient-communities/) to commercial social media such as *X*, *Facebook*, *Instagram*, *Threads*, *TikTok*, or *Bluesky*.
[More info](../../../tools/software/social-networks/index.md#mastodon)
[:octicons-home-16:](https://joinmastodon.org/)
[:octicons-feed-star-16:](https://www.privacyguides.org/articles/2025/07/15/mastodon-privacy-and-security/)
[Homepage](https://joinmastodon.org/)
[Review](https://www.privacyguides.org/articles/2025/07/15/mastodon-privacy-and-security/)
{ .pg:buttons }
</div>
@@ -148,7 +148,7 @@ Here are a few privacy-focused tools and services that can help you to organize
:loudspeaker: Use it as a privacy-preserving alternative to *Slack* or *Discord*.
[More info](../../../tools/software/social-networks/index.md#element)
[:octicons-home-16:](https://element.io/)
[Homepage](https://element.io/)
{ .pg:buttons }
</div>
@@ -161,7 +161,7 @@ Here are a few privacy-focused tools and services that can help you to organize
:video_camera: Use it to share videos with your community free from *YouTube*'s control.
[:octicons-home-16: Homepage](../../../tools/software/social-networks/index.md#peertube)
[Homepage](../../../tools/software/social-networks/index.md#peertube)
{ .pg:buttons }
</div>
@@ -175,7 +175,7 @@ Here are a few privacy-focused tools and services that can help you to organize
@counter-style emoji-list-b {
system: fixed;
symbols: "🗺️" "📅" "☁️" "📂";
suffix: " ";
suffix: " ";
</style>
<details class="info emoji-list-b" markdown>
@@ -214,4 +214,4 @@ More tools for community organization could include [LAUTI](https://lauti.org/)
- [Campaign accelerator training (*Mobilisation Lab*)](https://mobilisationlab.org/training-coaching/campaign-accelerator-training/)
<button class="toolbox-tip-button-next">[Go back to toolbox index :material-toolbox:](../..)</button>
<button class="toolbox-tip-button-next">[Go back to toolbox index](../..)</button>
+2 -2
View File
@@ -4,6 +4,6 @@
**Daniel** is a founding team member of Privacy Guides and part of its [executive committee](https://www.privacyguides.org/en/about/#executive-committee).
[:simple-mastodon: @dngray@mastodon.social](https://mastodon.social/@dngray "@dngray@mastodon.social")
[:simple-bluesky: dngray.bsky.social](https://bsky.app/profile/dngray.bsky.social "@dngray.bsky.social")
[@dngray@mastodon.social](https://mastodon.social/@dngray "@dngray@mastodon.social")
[dngray.bsky.social](https://bsky.app/profile/dngray.bsky.social "@dngray.bsky.social")
{ .pg:buttons }
+3 -3
View File
@@ -1,8 +1,8 @@
---
description: Em is the Activism & Outreach Lead at Privacy Guides. She is a publicinterest technologist and researcher who has been working on various independent projects in data privacy, information security, and software engineering since 2018.
schema:
-
"@context": https://schema.org
-
"@context": https://schema.org
"@type": ProfilePage
dateCreated: "2025-02-03T19:00:00Z"
dateModified: "2024-02-03T19:00:00Z"
@@ -29,5 +29,5 @@ schema:
Em is passionate about digital rights, privacy advocacy, solid security, and code for the public good. In her free time, you can find Em on Mastodon giving privacy tips or boosting photos of cats and moss.
[:simple-mastodon: @Em0nM4stodon@infosec.exchange](https://infosec.exchange/@Em0nM4stodon "@Em0nM4stodon@infosec.exchange")
[@Em0nM4stodon@infosec.exchange](https://infosec.exchange/@Em0nM4stodon "@Em0nM4stodon@infosec.exchange")
{ .pg:buttons }
+2 -2
View File
@@ -4,6 +4,6 @@
[**Freddy**](https://freddy.lol) is a founding team member of Privacy Guides and part of its [executive committee](https://www.privacyguides.org/en/about/#executive-committee). He writes in American English reluctantly.
[:simple-mastodon: @freddy@social.lol](https://social.lol/@freddy "@freddy@social.lol")
[:simple-bluesky: @freddy.lol](https://bsky.app/profile/freddy.lol "@freddy.lol")
[@freddy@social.lol](https://social.lol/@freddy "@freddy@social.lol")
[@freddy.lol](https://bsky.app/profile/freddy.lol "@freddy.lol")
{ .pg:buttons }
+4 -4
View File
@@ -1,8 +1,8 @@
---
description: Jonah is Privacy Guides' editor and Program Director. With over a decade of technical writing experience, his role includes researching and writing for Privacy Guides. He also runs Triplebit, a non-profit ISP behind many privacy-related tools.
schema:
-
"@context": https://schema.org
-
"@context": https://schema.org
"@type": ProfilePage
dateCreated: "2019-10-31T00:00:00Z"
dateModified: "2024-09-09T00:00:00Z"
@@ -31,6 +31,6 @@ schema:
[**Jonah Aragon**](https://www.jonaharagon.com) is *Privacy Guides'* editor and Program Director. With over a decade of technical writing experience, his role includes researching and writing for Privacy Guides. He also runs Triplebit, a non-profit ISP behind many privacy-related tools.
[:simple-mastodon: @jonah@neat.computer](https://mastodon.neat.computer/@jonah "@jonah@neat.computer")
[:simple-bluesky: @jonaharagon.com](https://bsky.app/profile/jonaharagon.com "@jonaharagon.com")
[@jonah@neat.computer](https://mastodon.neat.computer/@jonah "@jonah@neat.computer")
[@jonaharagon.com](https://bsky.app/profile/jonaharagon.com "@jonaharagon.com")
{ .pg:buttons }
+1 -1
View File
@@ -4,5 +4,5 @@
**Niek** is a founding team member of Privacy Guides and part of the [executive committee](https://www.privacyguides.org/en/about/#executive-committee). His day-to-day concerns for Privacy Guides entail both research and outreach.
[:simple-mastodon: @blacklight447@mastodon.social](https://mastodon.social/@blacklight447 "@blacklight447@mastodon.social")
[@blacklight447@mastodon.social](https://mastodon.social/@blacklight447 "@blacklight447@mastodon.social")
{ .pg:buttons }
+19 -19
View File
@@ -22,7 +22,7 @@ preview:
Biometrics are a convenient and secure way to authenticate our devices. Many of us use and trust the biometrics of our devices without much thought, but are they really secure? With so many [options](https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/), which ones are the best?<!-- more -->
## :material-fingerprint: Fingerprint sensors
## Fingerprint sensors
One of the most recognizable types of biometric authentication has to be the fingerprint reader. The idea is that everyone has a fairly unique fingerprint, so we should be able to distinguish between your fingerprint and someone else's reliably.
@@ -35,7 +35,7 @@ There are three main types of fingerprint: loops, whorls, and arches. Fingerprin
[Finger minutiae](https://sites.rutgers.edu/fingerprinting/no-two-finger-prints-are-alike/) data is used to identify a fingerprint as unique. This data consists of the points on your fingerprint where lines split, abruptly end, individual dots, etc. Two people can have the same number of arches, loops, and whorls, but they won't have the exact same configurations of minutiae. (1)
{ .annotate }
1. :material-fingerprint: It's theorized that the reason humans have fingerprints in the first place is to [enhance our sense of touch](https://www.science.org/doi/10.1126/science.1166467).
1. It's theorized that the reason humans have fingerprints in the first place is to [enhance our sense of touch](https://www.science.org/doi/10.1126/science.1166467).
![Example of finger minutiae including forks (where one line splits into multiple lines), ends (where a line ends), islands (isolated dots), and inclosures (lines that split into two and then reconnect)](../assets/images/biometrics-explained/finger-minutiae.webp)
@@ -45,7 +45,7 @@ Using these details for identification gives several advantages over trying to r
There are [three](https://www.androidauthority.com/how-fingerprint-scanners-work-670934/) main ways we accomplish this in consumer devices: optical sensors, capacitive sensors, and ultrasonic sensors.
### :material-camera: Optical
### Optical
An optical sensor works by taking a picture of your fingerprint and turning it into data. They are the cheapest and least secure option. Since optical sensors capture two-dimensional images, an attacker may gain access by simply taking a picture of your fingerprint.
@@ -57,7 +57,7 @@ Many devices implement one of these sensors under the display.
Optical sensors can struggle in the presence of bright sunlight, which is an issue on a mobile device that you take around with you and use wherever you are.
### :material-lightning-bolt: Capacitive
### Capacitive
Capacitive sensors measure the electrical conductivity of your finger. These are much more secure than optical sensors since they can't be fooled with an image. They're also tough to fool with prosthetics as different materials will have different electrical properties.
@@ -69,7 +69,7 @@ Capacitive sensors won't work if the [tissue is dead](https://www.livescience.co
Conveniently they also don't require a light source under them to work, although they will struggle in the presence of moisture.
### :material-volume-high: Ultrasonic
### Ultrasonic
Ultrasonic fingerprint sensors use sound to create a detailed 3D representation of your fingerprint using ultrasound waves (sound waves with a frequency greater than 20khz). It's a similar concept to what's used to map the ocean floor: sound is emitted from transducers and bounces off your skin. By measuring the time it takes for the sound to reach the microphones, your phone can create a detailed map of the ridges and valleys in your finger.
@@ -91,11 +91,11 @@ They also won't work with gloves and sometimes screen protectors can interfere,
Fingerprint authentication will protect you against someone filming you surreptitiously while typing in your password or shoulder surfing. This is an especially relevant attack if your threat model includes thieves as a common attack is watching you type your passcode in and then stealing your phone.
## :material-face-recognition: Face unlock
## Face unlock
Many devices come with the capability to unlock them using your face. The [implementations](https://www.androidauthority.com/face-unlock-smartphones-3043993/) of this technology can vary wildly between manufacturers since a secure implementation requires a lot of special hardware, so many OEMs choose to cheap out. All forms of face unlock are more likely to allow a twin or sibling into your device since their face is more similar to yours than a random person off the street, so keep that in mind in your threat model.
### :material-camera-front: 2D camera-based
### 2D camera-based
Every phone already has a camera, so why not use it for face unlock?
@@ -103,11 +103,11 @@ If you're relying on a plain 2D image, then there's always the possibility that
This form of face unlock is also less likely to work in low-light conditions than infrared variants.
### :material-heat-wave: 2D infrared-based
### 2D infrared-based
The next step up in security is an infrared sensor. This requires dedicated hardware to be built into the device, which eats up space and adds cost. But what you get in return is a form of face unlock that's more reliable in low-light conditions and more resistant to photographs.
### :material-cube-scan: 3D mapping
### 3D mapping
The potential of this technology truly shines when 2D face unlock is combined with an infrared flood illuminator. These are able to shine thousands of invisible infrared dots on your face and record the distance of each one, creating a 3D map of your face. As you can probably imagine, this tech takes up quite a bit of space and adds yet more cost to the device, as well as likely being the main reason for the "notch" on iPhones. This drawback is well worth it though. According to [Apple](https://support.apple.com/en-us/102381):
@@ -123,7 +123,7 @@ You'll likely want an implementation with some protection against another person
Some devices allow for unlocking with a facemask. This is less secure than without a facemask, so keep that in mind when enabling this setting.
## :material-eye: Iris sensors
## Iris sensors
A spy movie classic but newcomer in the consumer electronics field, iris sensors offer authentication via the unique properties of your eyes. The Apple Vision Pro is the most notable example with its [Optic ID](https://support.apple.com/en-us/118483).
@@ -131,7 +131,7 @@ It uses near-infrared light to reveal highly unique patterns independent of the
The extremely short distance this technology operates at makes it very difficult for someone to unlock your device without you noticing, and you can simply close your eyes to prevent someone from forcing you to unlock it.
## :material-matrix: Algorithm
## Algorithm
Because biometric systems need to translate the physical properties of your body to data, they rely on an algorithm to determine if their reading matches closely enough.
@@ -139,7 +139,7 @@ Because biometric systems need to translate the physical properties of your body
There is also independent research into the security of biometric systems. This combination of external and internal rigor helps ensure the security of these systems, although more well known brands like Apple and Google will receive more scrutiny than lesser-known ones.
## :material-keyboard: Typing biometrics
## Typing biometrics
Companies like [TypingDNA](https://www.typingdna.com) claim to be able to identify users by how they type.
@@ -147,11 +147,11 @@ The stated use case is 2FA and continuous authentication for employee devices. L
It could also be used on websites to uniquely identify you, so type in a text editor program then copy/paste into the browser window to avoid this specific type of fingerprinting.
## :material-walk: Gait biometrics
## Gait biometrics
Possibly the most insidious of the biometric systems in widespread use is gait recognition. Yes, you can be uniquely identified just by how you walk.
### :material-camera: Camera
### Camera
This technology can work using only 2D footage and doesn't even require close proximity or high resolution sensors like other forms of biometrics. Combined with the huge network of cameras deployed in most cities, you can potentially be identified and tracked around even with a fully covered face.
@@ -175,13 +175,13 @@ Model-free approaches don't try to model the human body but instead use the whol
<small aria-hidden="true">Image Credit: <a href="https://doi.org/10.1007/s11227-023-05156-9">Yousef, R.N., Khalil, A.T., Samra, A.S. et al.</a></small>
### :material-axis-arrow: Accelerometer
### Accelerometer
Accelerometers such as those found in your smartphone can also be used for gait recognition. These need to be worn on a person's body, so they can't be used from long distance like camera-based approaches.
Accelerometers work by measuring the accelerations in 3D space in X, Y, and Z coordinates. They tend to also utilize gyroscopes, which measure the orientation of a device.
### :material-foot-print: Floor sensor
### Floor sensor
It's possible to identify individuals using [sensors](https://www.amti.biz/product/bms464508/) in the floor that measure the pressure of your steps as you take them. There are already companies offering software/hardware [installations](https://www.scanalyticsinc.com/how-it-works) for tracking customers within a store using this technology.
@@ -189,7 +189,7 @@ It's possible to identify individuals using [sensors](https://www.amti.biz/produ
Floor sensors are especially concerning since they're completely invisible to you.
### :material-radar: Radar
### Radar
Radar works by transmitting a signal and measuring how long it takes for that signal to return, allowing you to measure how far an object is from you. In addition, if an object is moving relative to the sensor, the reflected waves will be a different frequency than when they were transmitted due to the [Doppler effect](https://www.noaa.gov/jetstream/doppler/how-radar-works). This can be used to determine the speed of an object and whether it's moving toward or away from you.
@@ -203,13 +203,13 @@ They claim it can uniquely identify individuals as well as penetrate walls, a wo
## What makes biometrics private?
### :material-cloud-off: Local Storage
### Local Storage
As with most things, keeping everything on your device is the key to private biometrics. A secure and private biometric authentication system should store any biometric data fully on-device and further, shouldn't make it accessible at all, even to the user. Biometric data is so incredibly sensitive and uniquely identifying that it needs to be treated with the utmost care. For example, apps on your phone don't have direct access to your fingerprint or face data, they must use an [API](https://developer.apple.com/documentation/localauthentication) to use biometric authentication.
On the other end of the spectrum we have companies like [IDEMIA](https://www.idemia.com) which boast about their [Augmented Vision](https://www.idemia.com/wp-content/uploads/2021/01/augmented-vision-platform-idemia-brochure-202102.pdf), designed to take video data from the myriad surveillance cameras littering every US city and track you around everywhere you go. It combines facial recognition, object recognition, plate reading, and much more to create an Orwellian surveillance apparatus that stores all your data in some server somewhere, fully accessible to their customers (or any hackers that want a treasure trove of surveillance data). They also have a product called [Mobile Biometric Check](https://www.idemia.com/wp-content/uploads/2021/02/mobile-biometric-check-idemia-brochure-202007.pdf) that allows cops to use their phone camera to take a picture of your fingerprints and compare them to a database. This is the exact opposite of responsible biometrics.
### :material-chip: Secure Element
### Secure Element
All forms of biometric authentication rely on proper hardware such as a secure element in order to be secure. The secure element provides a secure and tamper-resistant place to store your biometric data separate from the rest of the system, so it can't be easily extracted. Examples include Apple's [Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/web) and Google's [Titan M](https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html) series of chips. You should avoid devices that lack a secure element; they won't be able to properly implement secure biometrics without one.
+1 -1
View File
@@ -138,7 +138,7 @@ In the settings page, navigate to **Privacy, Search, and Services**
Under **Delete Browsing Data**, click on **Choose What to Clear**.
![Screenshot: Edge Settings ](../assets/images/clearing-your-browsing-data/edge4.webp)
![Screenshot: Edge Settings](../assets/images/clearing-your-browsing-data/edge4.webp)
Modify the time range and data to be deleted. Afterwards, click **Clear Now**.
+2 -2
View File
@@ -54,8 +54,8 @@ But you shouldn't trust anyone else either.
It was built from the ground up respecting the principles of [Privacy by Design](https://en.wikipedia.org/wiki/Privacy_by_design). All content kept in CryptPad is secured using solid end-to-end encryption, meaning that only the intended recipients can access the content. CryptPad itself cannot read, scan, or utilize your content in any way.
[:octicons-home-16: Website](https://cryptpad.org/)
[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/)
[Website](https://cryptpad.org/)
[Privacy Policy](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/)
{ .pg:buttons }
CryptPad is developed by a team from the French software company [XWiki](https://www.xwiki.com). Because [CryptPad is open-source](https://github.com/cryptpad), anyone can add contributions to it, inspect its code, or submit feature recommendations.
+1 -1
View File
@@ -45,7 +45,7 @@ A famous example is the AOL search log release. AOL had been logging its users s
#### Strava Heatmap Incident
In 2018, the fitness app Strava announced a major update to its heatmap, showing the the workout patterns of users of fitness trackers like Fitbit.
In 2018, the fitness app Strava announced a major update to its heatmap, showing the workout patterns of users of fitness trackers like Fitbit.
Analyst [Nathan Ruser](https://x.com/Nrg8000/status/957318498102865920) indicated that these patterns can reveal military bases and troop movement patterns. This is obviously a huge op-sec problem and can endanger the lives of troops.
+33 -33
View File
@@ -37,8 +37,8 @@ review:
**EasyOptOuts.com** is a $19.99/year [people-search site removal service](https://www.privacyguides.org/en/data-broker-removals/) which will search a number of different data broker sites and automatically submit opt-out requests on your behalf. They will perform the first search and removal process immediately, and then re-run the process every 4 months in case your data shows up on new sites over time.<!-- more -->
[:octicons-home-16: Homepage](https://easyoptouts.com)
[:octicons-eye-16:](https://easyoptouts.com/privacy)
[Homepage](https://easyoptouts.com)
[Privacy Policy](https://easyoptouts.com/privacy)
{ .pg:buttons }
## Background
@@ -87,17 +87,17 @@ Using standard engine search results is one of the most common methods of discov
**Person A (11 Google results):**
- 411.com
- thatsthem.com
- 411.com
- thatsthem.com
- blockshopper.com*
- fastpeoplesearch.com
- usphonebook.com
- spokeo.com
- truepeoplesearch.com
- information.com
- fastpeoplesearch.com
- usphonebook.com
- spokeo.com
- truepeoplesearch.com
- information.com
- peoplesearch.com*
- radaris.com
- peoplefinders.com
- radaris.com
- peoplefinders.com
</div>
@@ -105,14 +105,14 @@ Using standard engine search results is one of the most common methods of discov
**Person B (10 Google results):**
- whitepages.com
- truepeoplesearch.com
- usphonebook.com
- fastpeoplesearch.com
- spokeo.com
- radaris.com
- information.com
- thatsthem.com
- whitepages.com
- truepeoplesearch.com
- usphonebook.com
- fastpeoplesearch.com
- spokeo.com
- radaris.com
- information.com
- thatsthem.com
- idcrawl.com*
- peekyou.com*
@@ -184,14 +184,14 @@ On Google we saw some reduction, but many results with sensitive information rem
**Person A (8 Google results):**
- thatsthem.com
- thatsthem.com
- blockshopper.com*
- fastpeoplesearch.com
- usphonebook.com
- information.com
- fastpeoplesearch.com
- usphonebook.com
- information.com
- peoplesearch.com*
- radaris.com
- fastpeoplesearch.com
- radaris.com
- fastpeoplesearch.com
</div>
@@ -199,11 +199,11 @@ On Google we saw some reduction, but many results with sensitive information rem
**Person B (6 Google results):**
- truepeoplesearch.com
- usphonebook.com
- information.com
- fastpeoplesearch.com
- thatsthem.com
- truepeoplesearch.com
- usphonebook.com
- information.com
- fastpeoplesearch.com
- thatsthem.com
- peekyou.com*
</div>
@@ -239,9 +239,9 @@ Once again, we also searched for their information on Google, and we noticed a r
**Person A (4 Google results):**
- thatsthem.com
- thatsthem.com
- blockshopper.com*
- fastpeoplesearch.com
- fastpeoplesearch.com
- peoplesearch.com*
</div>
@@ -250,7 +250,7 @@ Once again, we also searched for their information on Google, and we noticed a r
**Person B (2 Google results):**
- thatsthem.com
- thatsthem.com
- peekyou.com*
</div>
+7 -7
View File
@@ -24,7 +24,7 @@ You might have heard of Tor in the news a few times, yet never dared to try it y
Today, Tor is easy to use for anyone. It helps not only journalists and activists, but anybody who seeks greater privacy online or access to information regardless of location. But what is Tor exactly? How can Tor help you? And why is it such an important tool?<!-- more -->
## :simple-torbrowser: What is Tor
## What is Tor
Tor is an overlay network that was specifically designed to protect the privacy of its users. The Tor Network uses multiple layers of encryption and relays in order to protect a person's location and other potential identifiers, such as an IP address.
@@ -139,7 +139,7 @@ The [Tor Project](https://www.torproject.org/) is the US-based nonprofit organiz
The nonprofit was founded in 2006 and gets its funding from [various sources](https://www.torproject.org/about/supporters/) including government grants, independent contributors, and individual [donations](https://donate.torproject.org/).
## :octicons-lock-16: What Tor can do
## What Tor can do
### Improve Privacy
@@ -176,7 +176,7 @@ You can even directly email **<gettor@torproject.org>** and send the name of you
If you want to help people around the world access the internet freely, you can volunteer to run a [Tor Snowflake](https://snowflake.torproject.org/) proxy. For more tech-savvy volunteers, you can also help by running a [Tor Bridge](https://community.torproject.org/relay/setup/bridge/), or even a [WebTunnel Bridge](https://community.torproject.org/relay/setup/webtunnel/).
## :octicons-heart-16: Why Tor is so important
## Why Tor is so important
### Tor is vital for human rights and democracy
@@ -246,7 +246,7 @@ This would be disastrous for the privacy community, journalists, activists, diss
From a human rights perspective, **we simply cannot afford to lose Tor**.
## :octicons-question-16: Things to consider when using Tor
## Things to consider when using Tor
### Tor compared to VPN protections
@@ -284,7 +284,7 @@ Depending on what kind of files it is, there are a number of problems that could
If you need to share files through Tor with a *trusted* contact, [OnionShare](https://www.privacyguides.org/en/file-sharing/#onionshare) is a good option.
## :octicons-stop-16: Addressing misconceptions
## Addressing misconceptions
There has been misconceptions floating around about Tor. Most of them repeat similar misinformation attributed to many other privacy tools: Why using this if you have nothing to hide? But this argument is incredibly flawed and comes from a naive understanding of privacy rights and needs.
@@ -357,7 +357,7 @@ Furthermore, unjustified bad reputations can severely hurt funding for tools lik
We all have a responsibility to verify which information we share with others, make sure we stop misinformation at its root, and correct harmful misconceptions everywhere we hear them.
## :material-hand-heart-outline: Tor needs our support
## Tor needs our support
**Tor is at risk, and needs our help.** Despite its strength and history, Tor isn't safe from the same attacks oppressive regimes and misinformed legislators direct at encryption and many other privacy-enhancing technologies.
@@ -395,7 +395,7 @@ There are many ways to help Tor survive and thrive! You can help by:
- Sharing this article 💜
## :octicons-bookmark-16: Onion sites you can visit using the Tor Browser
## Onion sites you can visit using the Tor Browser
- [Privacy Guides website](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion/en/) 💛
- [Privacy Guides forum](http://discuss.6xotdxvg7pexnean3xu6b7ivs7g52zcwsdbnz4mdm4byivc3yfv65aid.onion/)
@@ -17,7 +17,7 @@ preview:
If you are looking for a good remote password manager you can use from anywhere, there are plenty of excellent [options](https://www.privacyguides.org/en/passwords/) to choose from. However, if you prefer to only store your passwords locally, [KeePassXC](https://www.privacyguides.org/en/passwords/#keepassxc) is what you need. In this tutorial, we will set up KeePassXC to work with [YubiKey](https://www.privacyguides.org/en/security-keys/#yubikey) as an additional factor to secure your local-only password database.<!-- more -->
## :simple-keepassxc: KeePassXC summary
## KeePassXC summary
KeePassXC is a free, open-source, and desktop-only password manager. The community-driven project was first released in 2012 and is a fork of both the *KeePass Password Safe* application and *KeePassX*, which is no longer actively maintained.
@@ -63,7 +63,7 @@ In addition to the features we will set up here, KeePassXC offers the following:
On March 4th, KeePassXC released its most recent update. This update includes the capacity to import Proton Pass databases, to generate passphrases using *mixed* case (a mix of uppercase and lowercase), and many other [useful features](https://keepassxc.org/blog/2025-03-04-2.7.10-released/).
## :material-toolbox: Requirements and preparation
## Requirements and preparation
<div class="admonition info" markdown>
<p class="admonition-title">Operating systems</p>
@@ -79,7 +79,7 @@ For this tutorial you will need:
- [x] Ability to install software on this computer
- [x] One or two YubiKeys (ideally two)
## :material-download-circle: Setting up KeePassXC
## Setting up KeePassXC
### Step 1: Download and Install KeePassXC
@@ -182,11 +182,9 @@ No matter if you invent or generate your main password/passphrase, **make sure t
<div class="admonition success" markdown>
<p class="admonition-title">This step isn't over yet!</p>
This is where you will be adding your YubiKey to further secure your database. Keep the "Database Credentials" application window open and **continue with the step below** :material-arrow-down-bold:
This is where you will be adding your YubiKey to further secure your database. Keep the "Database Credentials" application window open and **continue with the step below** </div>
</div>
## :material-shield-key: Securing your database with a YubiKey
## Securing your database with a YubiKey
To add a YubiKey to secure your KeePassXC database, you will first need to prepare your YubiKey(s) for it, if it's not already ready to use with a [Challenge-Response](https://docs.yubico.com/yesdk/users-manual/application-otp/challenge-response.html) application.
@@ -245,7 +243,7 @@ If you do not plug in your YubiKey first, an error will be triggered, and you wi
</div>
## :fontawesome-solid-unlock-keyhole: Using KeePassXC
## Using KeePassXC
Using KeePassXC is quite simple and resembles most other password manager applications. The biggest difference is that your passwords will remain stored locally, unless you decide to back up your password database to a cloud service of your choice.
@@ -411,7 +409,7 @@ You are now logged in, thanks to KeePassXC!
</div>
## :material-hand-heart: Consider supporting KeePassXC
## Consider supporting KeePassXC
KeePassXC is a free and open-source project built by the community. If you use and love this application, it's always a great idea to support the project if you can.
@@ -43,7 +43,7 @@ Shortcuts is quite intuitive to work with, so if you don't like the behavior dem
brew install exiftool
```
!!! note
!!! note
You can check if ExifTool is installed by running `exiftool -ver`. You should see a version number.
### Creating the Shortcut
@@ -140,7 +140,7 @@ Windows allows you to place files in a **SendTo** folder which then appear in th
1. ExifTool is a tool for viewing and manipulating image, audio, video, and PDF metadata. We suggest you read the [Installation instructions](https://exiftool.org/install.html#Windows) on the official website.
!!! note
!!! note
You can check if ExifTool is present in your [PATH](https://www.computerhope.com/issues/ch000549.htm) by running `exiftool -ver` in Command Prompt. You should see a version number.
### Creating the shortcut
@@ -66,7 +66,7 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil
## Wi-Fi
You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button:
You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the info button:
- [x] Turn on **Private Wi-Fi Address**
+3 -3
View File
@@ -22,7 +22,7 @@ We're seeking a passionate multimedia content creator to spearhead our video pro
This is your chance to enter the tech & educational content creation space, without worrying about sponsors and advertisers diluting your message. We have no commercial interests to interfere with your content, and no agenda beyond simply providing the best privacy information out there. If you're excited about using the power of video to educate and inspire, we want to hear from you!
[Learn more and apply here :material-arrow-right-drop-circle:](https://privacyguides.org/en/about/jobs/content-creator/)
[Learn more and apply here](https://privacyguides.org/en/about/jobs/content-creator/)
## Journalist
@@ -30,13 +30,13 @@ We are also looking for a skilled journalist to join our team. This role will fo
Other tasks will be to research new subjects to cover, perform interviews, and conduct product and service reviews for our recommendations.
[Learn more and apply here :material-arrow-right-drop-circle:](https://privacyguides.org/en/about/jobs/journalist/)
[Learn more and apply here](https://privacyguides.org/en/about/jobs/journalist/)
## News Curation Internship
Finally, we are offering a paid internship position that will focus on staying up-to-date with the latest privacy and security news, interacting with our community, and providing overall support to our volunteers. This role will involve curating relevant articles, reports, and insights to keep our team informed and engaged with current events. This is an excellent opportunity for someone passionate about privacy issues and looking to gain hands-on experience in a non-profit environment. Ideal candidates will have strong research skills and a keen interest in digital rights.
[Learn more and apply here :material-arrow-right-drop-circle:](https://privacyguides.org/en/about/jobs/intern-news/)
[Learn more and apply here](https://privacyguides.org/en/about/jobs/intern-news/)
## Join us in making a difference
+8 -8
View File
@@ -58,7 +58,7 @@ For this review, the words "KeePassium" and "application" refer to both the KeeP
</div>
## :material-apple: Platforms and Compatibility
## Platforms and Compatibility
KeePassium is written in Apple's Swift programming language and is available for Apple devices.
@@ -114,7 +114,7 @@ It's also advisable to enable the backup feature and even keep a backup copy of
This is important because there is no remote database management done by KeePassium. **You are fully in control of your own data, but you are also fully responsible to protect it.**
## :material-wallet-bifold-outline: Pricing
## Pricing
KeePassium can be used completely for free!
@@ -130,7 +130,7 @@ For example, if you pay for Premium for only one year then stop, you will keep a
![Screenshot from the KeePassium website's Pricing page with a description of which features are included in each plan.](../assets/images/keepassium-review/keepassium-pricing.webp)
## :octicons-shield-check-16: Security and Trust
## Security and Trust
Security and trust are without a doubt the most important characteristics of a good password manager.
@@ -178,7 +178,7 @@ Interestingly, Cure53 has [audited](https://cure53.de/) many other well-known se
Finally, if you already trust KeePassXC for your desktop password manager, know that KeePassium is one of the apps [suggested](https://keepassxc.org/docs/) by KeePassXC to use on iOS.
## :octicons-lock-16: Privacy and Encryption
## Privacy and Encryption
Data privacy and encryption are fundamental aspects of any password managers. Because pretty much all data stored in a password manager is highly sensitive data, all data should be protected by strong end-to-end encryption.
@@ -244,7 +244,7 @@ Additionally, the LastPass' breach is a great argument in favor of keeping one's
![Screenshot from the iOS app showing the Encryption Settings.](../assets/images/keepassium-review/keepassium-encryptionoptions.webp){width="400"}
## :octicons-apps-16: Usage and Features
## Usage and Features
Once solid security and privacy protections have been confirmed, the second important part of a good password manager is how easy it is to use and the features it offers.
@@ -652,7 +652,7 @@ Interestingly, KeePassium even uses a quite decent PDF viewer on iOS:
![Screenshot from the iOS app showing a preview for a PDF file, in this case the document for Privacy by Design by Ann Cavoukian.](../assets/images/keepassium-review/keepassium-pdfviewer.webp){width="400"}
## :material-thumb-up-outline: Nice to have
## Nice to have
- You can see what was added, changed, or fixed for each KeePassium version from "Settings" in the "What's New" section.
@@ -669,7 +669,7 @@ KeePassium not only credits its direct contributors but also lists credits for e
</div>
## :material-thumb-down-outline: Downsides
## Downsides
Even if KeePassium is a great secure application that is easy and pleasant to use, there are still a few downsides that should be mentioned:
@@ -683,7 +683,7 @@ Even if KeePassium is a great secure application that is easy and pleasant to us
- AutoFill on macOS might not work with your favorite browser (if it isn't Safari).
## :octicons-key-16: Conclusion
## Conclusion
Overall, KeePassium is a privacy-focused, offline-first application, that has clearly prioritized user experience and user interface, while not neglecting security and privacy.
@@ -49,7 +49,7 @@ One of the wonderful possibility Mastodon offers is to [self-host your own Masto
For this reason, this article will focus on the experience from the **user side**, not the administrator side.
## :octicons-home-16: Choosing a Mastodon instance
## Choosing a Mastodon instance
The biggest distinction of Mastodon compared to commercial social media is its true decentralization.
@@ -94,7 +94,7 @@ Even if the Mastodon migration process doesn't allow for automatic posts transfe
</div>
## :octicons-shield-check-16: How secure is Mastodon
## How secure is Mastodon
As explained previously, choosing an instance with a competent and trustworthy administration team is fundamental on Mastodon. Due to a plurality of instances, levels of security expertise can greatly vary from one server to another.
@@ -144,7 +144,7 @@ While security and privacy are related concepts that can enhance each other, the
Both privacy and security are important to consider for users, and both must be examined when evaluating software.
## :octicons-lock-16: How private is Mastodon
## How private is Mastodon
When using social media, there are always two sides to data privacy: The data collected by the service, and the data exposed by the user posting content.
@@ -208,7 +208,7 @@ Most important of all, because Mastodon has no interest in monetizing your data,
This is completely antithesis to commercial social media. And this alone makes Mastodon fundamentally **much more private than any other big tech platforms**.
## :material-lock-check-outline: Privacy benefits of Mastodon
## Privacy benefits of Mastodon
Each Mastodon instance will have a different privacy policy that you should consult before creating an account, like for any other platforms. But unless the software was modified, data collection should be similar to what is described here, and remain minimal for the majority of connected instances.
@@ -240,7 +240,7 @@ With Mastodon, you are not stuck with only one app. If you don't like the offici
So many services and websites have adopted a hostile stance towards people using privacy protections such as a VPN server, a privacy-focused browser, or running their phone in [Lockdown Mode](https://support.apple.com/en-us/105120). But with Mastodon, you are free to use all the protections you love. **Mastodon isn't hostile to your privacy.**
## :octicons-alert-16: What to stay careful about
## What to stay careful about
While the privacy benefits of Mastodon are numerous, there are also a few things to keep in mind when using the platform:
@@ -317,7 +317,7 @@ Because yes, this choice does burden you to pick who you trust, but **it also em
Be careful who you trust of course, but don't get paralyzed by this choice. Even if this might feel intimidating at first, this fear of choosing isn't worth staying with possibly even less trustworthy big tech administrators.
## :octicons-star-16: Mastodon keeps getting better
## Mastodon keeps getting better
This article only presents an overview of Mastodon's features, and focuses on the features related to privacy and security. But Mastodon is so much more. It's a social platform that truly respects its community.
@@ -340,7 +340,7 @@ To continue learning about Mastodon's privacy and security features, consult the
</div>
## :material-hand-heart-outline: Consider supporting Mastodon
## Consider supporting Mastodon
Mastodon doesn't sell your data, but it still needs money to survive and thrive. Mastodon is supported by its community!
@@ -68,7 +68,7 @@ The Mastodon *software* is different from the Mastodon.Social original *instance
</div>
## :octicons-shield-check-16: Improving account security
## Improving account security
Using a [unique email address](https://www.privacyguides.org/en/email-aliasing/) and a unique and [strong password](https://www.privacyguides.org/en/basics/passwords-overview/) are the starting points for good account security, and this is no different for Mastodon accounts.
@@ -160,7 +160,7 @@ If you see a login that isn't legitimate, you should *immediately* revoke access
![Screenshot of the Mastodon web interface showing the Authentication history page from clicking on the "View authentication history of your account" link on the previous Account settings page.](../assets/images/mastodon-tutorial-privacy-and-security/mastodon-accesses-login-history.webp)
## :octicons-lock-16: Adjusting privacy vs discovery
## Adjusting privacy vs discovery
When using social media, there's usually a sliding scale between privacy and discoverability.
@@ -194,7 +194,7 @@ Once you have adjusted the account options to your preferences, click on "Save c
![Screenshot of the Mastodon web interface showing the Public profile page in Preferences, from the "Privacy and reach" tab. The page is scrolled down to the "Save changes" button at the very bottom of the six unchecked options.](../assets/images/mastodon-tutorial-privacy-and-security/mastodon-account-privacy-options.webp)
## :material-message-lock-outline: Selecting post visibility and access
## Selecting post visibility and access
In addition to your account's privacy preferences, you can also adjust visibility for each post. This is very handy to allow you to pick in a more granular way which information you wish to share more or less openly.
@@ -298,7 +298,7 @@ Confirm your choice by clicking on "Save changes" on the upper-right.
![Screenshot of the Mastodon web interface showing the "Preferences" page in Preferences.](../assets/images/mastodon-tutorial-privacy-and-security/mastodon-posts-quote-posts.webp)
## :material-checkbox-marked-circle-outline: Verifying yourself and others
## Verifying yourself and others
The account verification process on Mastodon is excellent. Not only is it free, but it doesn't require you to provide any official ID or other intrusive documentation to proof your identity. It is a privacy-respectful verification feature.
@@ -348,7 +348,7 @@ To add author attributions to your articles, scroll down the same page and simpl
![Screenshot of the Mastodon web interface showing the Public profile page in Preferences, from the "Verification" tab. The page is scrolled down to the very bottom, showing the option and instructions to add Author attribution to articles.](../assets/images/mastodon-tutorial-privacy-and-security/mastodon-verification-author-setup.webp)
## :material-folder-multiple-outline: Deleting and accessing your data
## Deleting and accessing your data
Data deletion is a fundamental part of data privacy, and a protected right under many privacy laws.
@@ -390,7 +390,7 @@ Once you are ready to delete your data (and have downloaded the data you wish to
![Screenshot of the Mastodon web interface showing the Account deletion page, from the "proceed here" link on the previous "Account" page.](../assets/images/mastodon-tutorial-privacy-and-security/mastodon-deletion-account.webp)
## :octicons-blocked-16: Blocking users and instances
## Blocking users and instances
You have a lot of control on which information you show and see on Mastodon. Like for other social media, you can block users individually on Mastodon. But additionally, you can also block a whole instance if you aren't happy interacting with it. This, like an individual block, can benefit your privacy by restricting further who can access your posts.
@@ -490,7 +490,7 @@ Only report content that violates the policies of your instance, or theirs. Do n
</div>
## :fontawesome-solid-hashtag: Opting out with hashtags
## Opting out with hashtags
Data privacy and user consent are principles strongly valued by the Fediverse community. Sometimes, developers trying to create tools for the Fediverse or utilizing its user data without prior explicit consent have come into conflict with these values.
@@ -506,7 +506,7 @@ Ideally, all data collection should be prohibited until users' consent is obtain
Adding these hashtags (and maybe others in the future) to your profile biography *might* help to opt out certain data collection and certain tools built by developers who do respect users' consent. This can effectively *reduce* data scraping, in some situations. If anything, it is at least a public statement against disrespectful (and sometimes illegal) practices.
## :material-arrow-right-bold-box-outline: Moving to another instance
## Moving to another instance
The freedom to move from one instance to another can greatly contribute to keeping Mastodon a place that puts its users first.
@@ -605,7 +605,7 @@ If your old instance isn't shutting down, you can also keep it of course. But re
</div>
## :material-hand-heart-outline: Consider supporting Mastodon
## Consider supporting Mastodon
Mastodon is supported by its community! If you enjoy the platform and can contribute, consider supporting the project by:
+6 -6
View File
@@ -36,18 +36,18 @@ review:
Search the App Store for "Tor Browser" and you'll be flooded with a variety of ways to connect to the Tor network from your iPhone. However, there's only one solution officially [endorsed](https://support.torproject.org/tormobile/tormobile-3/) by the Tor Project themselves: **Onion Browser**.<!-- more -->
[:octicons-home-16: Homepage](https://onionbrowser.com)
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy)
[:octicons-info-16:](https://onionbrowser.com/faqs)
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser)
[:octicons-heart-16:](https://onionbrowser.com/donate)
[Homepage](https://onionbrowser.com)
[Privacy Policy](https://onionbrowser.com/privacy-policy)
[Documentation](https://onionbrowser.com/faqs)
[Source Code](https://github.com/OnionBrowser/OnionBrowser)
[Contribute](https://onionbrowser.com/donate)
{ .pg:buttons }
Onion Browser is an open-source app created by Mike Tigas, who has worked closely with Tor Project in the past and was previously an investigative journalist at ProPublica (he is currently an advisor at the FTC). His company still maintains the app, although lately it is primarily [developed](https://github.com/OnionBrowser/OnionBrowser/graphs/contributors) by other maintainers.
!!! info inline end "Side info"
- [:simple-appstore: App Store download](https://apps.apple.com/app/id519296448)
- [App Store download](https://apps.apple.com/app/id519296448)
We already recommend Onion Browser for any iOS users out there, with the important caveat that it doesn't have all the privacy features that Tor Browser on *other* operating systems would provide.
@@ -25,7 +25,7 @@ Were excited to welcome Em (she/her), our new journalist, who will play an im
*Em is also a human rights activist who deeply values inclusivity, diversity, accessibility, and software for the public good. In her free time, you can find Em on Mastodon sharing privacy tips or boosting photos of cats and moss.*
[:material-mastodon: Follow Em at @Em0nM4stodon@infosec.exchange](https://infosec.exchange/@Em0nM4stodon)
[Follow Em at @Em0nM4stodon@infosec.exchange](https://infosec.exchange/@Em0nM4stodon)
## Jordan Content Producer
@@ -37,7 +37,7 @@ We also welcome Jordan Warne (they/them), our new content producer who will mana
*Outside producing high-quality videos, Jordan enjoys exploring the Australian bush, capturing intricate details of its flora and fauna through photography.*
[:material-mastodon: Follow Jordan at @jw@social.lol](https://social.lol/@jw)
[Follow Jordan at @jw@social.lol](https://social.lol/@jw)
## Kevin Intern
@@ -49,7 +49,7 @@ Last but not least, we are excited to start working with Kevin Pham (he/him), ou
*Besides doom scrolling on social media, he loves cooking new recipes, reading philosophy essays, and perpetuating his caffeine addiction with Vietnamese coffee. Please feel free to reach out to him to discuss anything regarding best operational security practices and threat modeling...or just say hi!*
[:material-mastodon: Follow Kevin at @kevpham@mastodon.social](https://mastodon.social/@kevpham)
[Follow Kevin at @kevpham@mastodon.social](https://mastodon.social/@kevpham)
## What This Means for Privacy Guides
@@ -60,6 +60,6 @@ Were excited to see how these talented people will help Privacy Guides contin
Thank you for being a part of our community, and stay tuned for the exciting new content and updates that will be coming your way soon!
Welcome aboard, Em, Jordan, and Kevin! Lets make privacy accessible for everyone. 🚀
[:material-mastodon: Follow Privacy Guides at @privacyguides@neat.computer](https://mastodon.neat.computer/@privacyguides)
[Follow Privacy Guides at @privacyguides@neat.computer](https://mastodon.neat.computer/@privacyguides)
[:material-youtube: Subscribe to Privacy Guides on YouTube](https://www.youtube.com/@privacyguides)
[Subscribe to Privacy Guides on YouTube](https://www.youtube.com/@privacyguides)
+7 -7
View File
@@ -204,19 +204,19 @@ And finally, as individuals, we share this duty of care and must all work on imp
If you or someone you know is in one of the situations described above, these additional resources may help. Make sure to take [appropriate measures](https://www.privacyguides.org/en/basics/threat-modeling/) to protect your privacy if your situation is sensitive. If you are in a high risk situation, you might want to access these resources using [Tor](https://www.privacyguides.org/en/advanced/tor-overview/) or [Tails](installing-and-using-tails.md).
**Suicide & Crisis Support Line** :material-arrow-right-bold: [988 Lifeline](https://988lifeline.org/) Phone number: 988 (US & Canada)
**Suicide & Crisis Support Line** [988 Lifeline](https://988lifeline.org/) Phone number: 988 (US & Canada)
**Trans Peer Support** :material-arrow-right-bold: [Trans Lifeline Hotline](https://translifeline.org/hotline/) Phone number US: 1-877-565-8860 / Canada: 1-877-330-6366
**Trans Peer Support** [Trans Lifeline Hotline](https://translifeline.org/hotline/) Phone number US: 1-877-565-8860 / Canada: 1-877-330-6366
**Stalking Victim Support** :material-arrow-right-bold: US: [SafeHorizon](https://www.safehorizon.org/get-help/stalking/) / Canada: [The Canadian Resource Centre for Victims of Crime](https://crcvc.ca/wp-content/uploads/2021/09/Cyberstalking-_DISCLAIMER_Revised-Aug-2022_FINAL.pdf)
**Stalking Victim Support** US: [SafeHorizon](https://www.safehorizon.org/get-help/stalking/) / Canada: [The Canadian Resource Centre for Victims of Crime](https://crcvc.ca/wp-content/uploads/2021/09/Cyberstalking-_DISCLAIMER_Revised-Aug-2022_FINAL.pdf)
**Domestic Violence Victim Support** :material-arrow-right-bold: US: [The National Domestic Violence Hotline](https://www.thehotline.org/) Phone number: 1-800-799-7233 / Canada: [Canadian resources by situation and province](https://www.canada.ca/en/public-health/services/health-promotion/stop-family-violence/services.html)
**Domestic Violence Victim Support** US: [The National Domestic Violence Hotline](https://www.thehotline.org/) Phone number: 1-800-799-7233 / Canada: [Canadian resources by situation and province](https://www.canada.ca/en/public-health/services/health-promotion/stop-family-violence/services.html)
**Reproductive Rights & Healthcare** :material-arrow-right-bold: US: [Planned Parenthood](https://www.plannedparenthood.org/) / Canada: [Action Canada for Sexual Health & Rights](https://www.actioncanadashr.org/resources/services)
**Reproductive Rights & Healthcare** US: [Planned Parenthood](https://www.plannedparenthood.org/) / Canada: [Action Canada for Sexual Health & Rights](https://www.actioncanadashr.org/resources/services)
**Journalists and Whistleblowers** :material-arrow-right-bold: US: [Freedom or the Press Foundation Guides & Resources](https://freedom.press/digisec/guides/) / Canada: [Canadian Association of Journalists](https://caj.ca/advocacy/digital-security/)
**Journalists and Whistleblowers** US: [Freedom or the Press Foundation Guides & Resources](https://freedom.press/digisec/guides/) / Canada: [Canadian Association of Journalists](https://caj.ca/advocacy/digital-security/)
**Protesters** :material-arrow-right-bold: [The Protesters' Guide to Smartphone Security](activists-guide-securing-your-smartphone.md)
**Protesters** [The Protesters' Guide to Smartphone Security](activists-guide-securing-your-smartphone.md)
</div>
@@ -27,7 +27,7 @@ That being said, the United States *certainly* does not have a monopoly on the b
If supporting the European tech industry is something that is important to you, here's a non-exhaustive list of some of our favorites. We have many more recommendations throughout our website if you are interested in learning more about privacy-respecting tech alternatives!
## :material-email: Email Services
## Email Services
Many people and businesses are tied to Google's Gmail or Microsoft's Outlook products, but there are *far* more secure and private [alternative email providers](https://www.privacyguides.org/en/email/) out there!
@@ -42,8 +42,8 @@ Based in Hanover, Germany, **Tuta** is an email service with a focus on security
Free accounts start with 1 GB of storage.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/email/#tuta)
[:octicons-home-16:](https://tuta.com)
[More Info](https://www.privacyguides.org/en/email/#tuta)
[Homepage](https://tuta.com)
{ .pg:buttons }
</div>
@@ -58,13 +58,13 @@ Based in Geneva, Switzerland, **Proton Mail** is an email service with a focus o
The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/email/#proton-mail)
[:octicons-home-16:](https://proton.me)
[More Info](https://www.privacyguides.org/en/email/#proton-mail)
[Homepage](https://proton.me)
{ .pg:buttons }
</div>
## :material-file-document-edit: Office Suites
## Office Suites
Of course, email isn't the only thing offered by solutions like Google Workspace and Microsoft 365. Many people use their entire suite of [productivity tools](https://www.privacyguides.org/en/document-collaboration/) to manage their businesses and collaborate with others.
@@ -80,13 +80,13 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/document-collaboration/#cryptpad)
[:octicons-home-16:](https://cryptpad.org)
[More Info](https://www.privacyguides.org/en/document-collaboration/#cryptpad)
[Homepage](https://cryptpad.org)
{ .pg:buttons }
</div>
:material-star-box: We recently did a [full review of CryptPad](cryptpad-review.md), which you should definitely check out if you might be interested in switching!
We recently did a [full review of CryptPad](cryptpad-review.md), which you should definitely check out if you might be interested in switching!
### Nextcloud :flag_de:
@@ -98,8 +98,8 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
**Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/document-collaboration/#nextcloud)
[:octicons-home-16:](https://nextcloud.com)
[More Info](https://www.privacyguides.org/en/document-collaboration/#nextcloud)
[Homepage](https://nextcloud.com)
{ .pg:buttons }
</div>
@@ -114,13 +114,13 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
Web-based editors aren't for everyone. If you need a full-fledged office suite that runs locally on your computer, **LibreOffice** is a fantastic alternative to Microsoft Office.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/office-suites/#libreoffice)
[:octicons-home-16:](https://libreoffice.org)
[More Info](https://www.privacyguides.org/en/office-suites/#libreoffice)
[Homepage](https://libreoffice.org)
{ .pg:buttons }
</div>
## :material-search-web: Search Engines
## Search Engines
One of the most frequently used tools on the internet is the venerable search engine. Switching from **Google** to an [alternative](https://www.privacyguides.org/en/search-engines/) is one of the biggest impact approaches to improving your privacy that you can make.
@@ -135,15 +135,15 @@ Headquartered and developed in the Netherlands, Startpage is one great alternati
**Startpage** is a private search engine. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. However, unlike the name suggests, the feature should not be relied upon for *total* anonymity.
[:octicons-info-16: Homepage](https://www.privacyguides.org/en/search-engines/#startpage)
[:octicons-home-16:](https://startpage.com)
[Homepage](https://www.privacyguides.org/en/search-engines/#startpage)
[Homepage](https://startpage.com)
{ .pg:buttons }
</div>
It is worth noting that [since 2020](relisting-startpage.md), Startpage has been a subsidiary of American company System1. Their operations and employees remain in the Netherlands, and you can choose to utilize only European servers if you wish.
## :material-earth: Web Browsers
## Web Browsers
Web browsers are historically very tricky to build, and the three major browser engines, Chromium, Gecko (Firefox), and WebKit (Safari) are all *primarily* developed by American companies. This is a space that could certainly use improvement.
@@ -157,13 +157,13 @@ One of our [recommended browsers](https://www.privacyguides.org/en/desktop-brows
**Mullvad Browser** is a version of Tor Browser with Tor network integrations removed. It aims to provide to VPN users Tor Browser's anti-fingerprinting browser technologies, which are key protections against mass surveillance programs. It is developed by the Tor Project and distributed by Mullvad, although it does *not* require the use of Mullvad's VPN.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser)
[:octicons-home-16:](https://mullvad.net/en/browser)
[More Info](https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser)
[Homepage](https://mullvad.net/en/browser)
{ .pg:buttons }
</div>
## :material-map: Maps & Navigation
## Maps & Navigation
Mapping and location apps like Google Maps can track your every move, and that data is used by tech companies for a wide variety of purposes, including for military and defense. The best mapping apps for your privacy can be used completely offline:
@@ -175,8 +175,8 @@ Mapping and location apps like Google Maps can track your every move, and that d
Based in Estonia, **Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/maps/#organic-maps)
[:octicons-home-16:](https://organicmaps.app)
[More Info](https://www.privacyguides.org/en/maps/#organic-maps)
[Homepage](https://organicmaps.app)
{ .pg:buttons }
</div>
@@ -189,13 +189,13 @@ Based in Estonia, **Organic Maps** is an open source, community-developed map di
Based in the Netherlands, **OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data.
[:octicons-home-16: More Info](https://www.privacyguides.org/en/maps/#osmand)
[:octicons-home-16:](https://osmand.net)
[More Info](https://www.privacyguides.org/en/maps/#osmand)
[Homepage](https://osmand.net)
{ .pg:buttons }
</div>
## :material-form-textbox-password: Password Managers
## Password Managers
### KeePassXC :flag_de:
@@ -205,13 +205,13 @@ Based in the Netherlands, **OsmAnd** is an offline map and navigation applicatio
**KeePassXC** is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal of extending and improving it with new features and bug fixes to provide a feature-rich, cross-platform, and modern open-source password manager.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/passwords/#keepassxc)
[:octicons-home-16:](https://keepassxc.org)
[More Info](https://www.privacyguides.org/en/passwords/#keepassxc)
[Homepage](https://keepassxc.org)
{ .pg:buttons }
</div>
:material-star-box: We recently published an article on [securely using KeePassXC with a YubiKey](installing-keepassxc-and-yubikey.md)!
We recently published an article on [securely using KeePassXC with a YubiKey](installing-keepassxc-and-yubikey.md)!
### Proton Pass :flag_ch:
@@ -221,13 +221,13 @@ Based in the Netherlands, **OsmAnd** is an offline map and navigation applicatio
**Proton Pass** is an open-source, end-to-end encrypted password manager developed by the Swiss company Proton AG, the team behind Proton Mail. It securely stores your login credentials, generates unique email aliases, and supports and stores passkeys.
[:octicons-home-16: More Info](https://www.privacyguides.org/en/passwords/#proton-pass)
[:octicons-home-16:](https://proton.me/pass)
[More Info](https://www.privacyguides.org/en/passwords/#proton-pass)
[Homepage](https://proton.me/pass)
{ .pg:buttons }
</div>
## :material-chat-processing: Instant Messengers
## Instant Messengers
Switching off of WhatsApp, Facebook Messenger, or iMessage in favor of a more [private instant messenger](https://www.privacyguides.org/en/real-time-communication/) is an excellent way to safeguard your chats.
@@ -243,8 +243,8 @@ Element is based in the United Kingdom, which is of course no longer in the Euro
Messages and files shared in private rooms (those which require an invite) are by default E2EE, as are one-to-one voice and video calls.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#element)
[:octicons-home-16:](https://element.io)
[More Info](https://www.privacyguides.org/en/real-time-communication/#element)
[Homepage](https://element.io)
{ .pg:buttons }
</div>
@@ -259,8 +259,8 @@ Another open-source option from the United Kingdom, SimpleX chat has very strong
**SimpleX Chat** is an instant messenger that doesn't depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against censorship.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#simplex-chat)
[:octicons-eye-16:](https://simplex.chat)
[More Info](https://www.privacyguides.org/en/real-time-communication/#simplex-chat)
[Privacy Policy](https://simplex.chat)
{ .pg:buttons }
</div>
@@ -275,8 +275,8 @@ Briar is an open source project not legally incorporated in any jurisdiction, al
**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network, making it an effective tool at circumventing censorship. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briars local mesh mode can be useful when internet availability is a problem.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#briar)
[:octicons-home-16:](https://briarproject.org)
[More Info](https://www.privacyguides.org/en/real-time-communication/#briar)
[Homepage](https://briarproject.org)
{ .pg:buttons }
</div>
@@ -38,14 +38,14 @@ Additionally, your Signal PIN can also double as a registration lock that preven
If you haven't set up a Signal PIN, or have previously opted out of setting one up, follow these steps on Android/iOS:
- Select :material-dots-vertical:**Settings****Account** → **Signal PIN**
- Select → **Settings****Account** → **Signal PIN**
- Select **Create new PIN**
Signal will prompt you to enter a PIN. We suggest using a strong, alphanumeric PIN that can be stored in a [password manager](https://www.privacyguides.org/en/passwords/).
Once you have done that, or if you already have set up a PIN, make sure that **Registration Lock** is also enabled.
- Select :material-dots-vertical:**Settings****Account** → **Signal PIN**
- Select → **Settings****Account** → **Signal PIN**
- [x] Turn on **Registration Lock**
!!! Important
@@ -70,7 +70,7 @@ It is best practice to always compare safety numbers with your contacts. This ca
To view the safety number for a particular contact, you need to follow these steps within Signal:
- Go to a chat with a contact.
- Select the chat header or :material-dots-vertical: → **View Safety Number**
- Select the chat header or → **View Safety Number**
Once you've compared the safety numbers on both devices, you can mark that contact as **Verified**.
@@ -92,14 +92,14 @@ It is good practice to set up disappearing messages in Signal's settings so that
On Android/iOS:
- Select :material-dots-vertical:**Settings** → **Privacy**
- Select → **Settings** → **Privacy**
- Under **Disappearing messages**, select **Default timer for new chats**
- Select the desired amount of time and select **Save**
- Select the desired amount of time and select **Save**
!!! tip "Override the global default for specific contacts"
- Go to a chat with a contact
- Select :material-dots-vertical: on the top right
- Select on the top right
- Select **Disappearing messages**
- Select the desired amount of time and select **Save**
@@ -119,12 +119,12 @@ Your recipient doesn't make any requests unless they open the link on their end.
On Android/iOS:
- Select :material-dots-vertical:**Settings** → **Chats**
- Select → **Settings** → **Chats**
- [ ] Turn off **Generate link previews**
### Screen Security
Signal allows you to prevent a preview of the app being shown (i.e., in the app switcher) unless you explicitly open it. This option can be found in :material-dots-vertical:**Settings****Privacy**.
Signal allows you to prevent a preview of the app being shown (i.e., in the app switcher) unless you explicitly open it. This option can be found in → **Settings****Privacy**.
=== "Android"
@@ -142,14 +142,14 @@ To mitigate this, you can leverage the Screen Lock option to require additional
On Android/iOS:
- Select :material-dots-vertical:**Settings** → **Privacy**
- Select → **Settings** → **Privacy**
- [x] Turn on **Screen Lock**
### Notification Privacy
Even when your phone is locked, anyone who can lay eyes on the device can read messages and sender names from your lock screen.
On Signal, you have the ability to hide message content and sender name, or just the message content itself. This option can be found in :material-dots-vertical:**Settings****Notifications****Show**.
On Signal, you have the ability to hide message content and sender name, or just the message content itself. This option can be found in → **Settings****Notifications****Show**.
=== "Android"
@@ -165,7 +165,7 @@ Signal allows you to relay all calls (including video calls) through the Signal
On Android/iOS:
- Select :material-dots-vertical:**Settings****Privacy** → **Advanced**
- Select → **Settings****Privacy** → **Advanced**
- [x] Turn on **Always Relay Calls**
For incoming calls from people who are not in your Contacts app, the call will be relayed through the Signal server regardless of how you've set it up.
@@ -176,7 +176,7 @@ If Signal is blocked in your country, it has a built-in "Censorship Circumventio
On Android/iOS:
- Select :material-dots-vertical:**Settings****Privacy** → **Advanced**
- Select → **Settings****Privacy** → **Advanced**
- [x] Turn on **Censorship Circumvention**
Additionally, Signal allows you to set up a proxy to bypass censorship.
@@ -193,7 +193,7 @@ Signal allows you to see your call history from your regular phone app. This all
If you use iCloud and you dont want to share call history on Signal, confirm its turned off:
- Select :material-dots-vertical:**Settings** → **Privacy**
- Select → **Settings** → **Privacy**
- [ ] Turn off **Show Calls in Recents**
## Signal Hardening
@@ -202,7 +202,7 @@ If you use iCloud and you dont want to share call history on Signal, confirm
While it may be tempting to link your Signal account to your desktop device for convenience, keep in mind that this extends your trust to an additional and potentially less secure operating system.
Avoid linking your Signal account to a desktop device to reduce your attack surface if your threat model calls for protecting against [:material-bug-outline: Passive Attacks](https://www.privacyguides.org/en/basics/common-threats/#security-and-privacy){ .pg-orange }.
Avoid linking your Signal account to a desktop device to reduce your attack surface if your threat model calls for protecting against [Passive Attacks](https://www.privacyguides.org/en/basics/common-threats/#security-and-privacy){ .pg-orange }.
### Molly (Android)
@@ -223,13 +223,13 @@ Fediverse-connected platforms tend to value users privacy and security much more
You will still need to go through the settings to adjust and harden your privacy preferences, but you'll see already that almost no personal data is required to sign up, and there will be no advertising profile tracking you around (and no ads!).
- [Replacing X and Threads with :material-arrow-right-bold: Mastodon](https://joinmastodon.org/)
- [Replacing Facebook with :material-arrow-right-bold: Friendica](https://friendi.ca/)
- [Replacing Instagram with :material-arrow-right-bold: Pixelfed](https://pixelfed.org/)
- [Replacing YouTube with :material-arrow-right-bold: PeerTube](https://joinpeertube.org/)
- [Replacing TikTok with :material-arrow-right-bold: Loops](https://joinloops.org/)
- [Replacing Reddit with :material-arrow-right-bold: Lemmy](https://join-lemmy.org/)
- [Replacing Meetup or Facebook Groups with :material-arrow-right-bold: Mobilizon](https://mobilizon.org/)
- [Replacing X and Threads with Mastodon](https://joinmastodon.org/)
- [Replacing Facebook with Friendica](https://friendi.ca/)
- [Replacing Instagram with Pixelfed](https://pixelfed.org/)
- [Replacing YouTube with PeerTube](https://joinpeertube.org/)
- [Replacing TikTok with Loops](https://joinloops.org/)
- [Replacing Reddit with Lemmy](https://join-lemmy.org/)
- [Replacing Meetup or Facebook Groups with Mobilizon](https://mobilizon.org/)
### Private messaging: One-on-one and group chats
+12 -12
View File
@@ -80,41 +80,41 @@ So, what concrete actions can we take *right now* to improve our culture around
Here are a few practices you can adopt in your daily life to improve the data of the people around you. However, I insist you not just demand others do this for you, but **do this for others too**. Re-shaping our culture needs to start with ourselves:
### :material-camera-off: Ask for consent before sharing/posting photos
### Ask for consent before sharing/posting photos
Do not post photos of people online without their prior consent. Especially if there are children involved! Before sharing photos of others online, *always* ask for their consent first.
### :material-face-recognition: Be mindful when sharing photos of protests
### Be mindful when sharing photos of protests
Be very careful when [taking pictures during a protest](https://www.privacyguides.org/articles/2025/01/23/activists-guide-securing-your-smartphone/). There's a lot of nuance to this because it's also important to show protests and make them known (that's usually the goal!), but in some circumstances people might be put in danger if their faces are shown online associated with certain causes.
Be mindful and make sure no one is singled out without consent in your pictures if you post them online. When possible, try to blur/block the faces of the people you couldn't ask for consent.
### :material-car: Blur license plates
### Blur license plates
When taking photos in the streets and posting them online, be mindful to blur license plates. This might sound extreme but imagine a situation where someone is a victim of domestic violence and their abuser sees their car parked at a shelter, or at someone's place. This information could literally get someone killed. Always keep in mind different people have different [threat models](https://www.privacyguides.org/en/basics/threat-modeling/).
### :material-contacts: Safeguard contact information
### Safeguard contact information
Never share the contact information of someone with someone else (or something else) without their prior explicit consent. This includes email addresses, phone numbers, legal names, locations, photos, and *especially* home addresses. This information in the wrong hands could literally get someone killed. **Always ask first!**
Additionally, be vigilant when importing your contact list in a new application. This could get it shared further than you intended. Ideally, always keep your contact list in an end-to-end encrypted application only.
### :material-file-eye: Be careful when sharing files from and with others
### Be careful when sharing files from and with others
If someone trusted you with a file (photo, music, video, PDF, text file, etc.), always ask for consent before sharing this file with someone else.
Additionally, always keep this file only locally or stored in a secure end-to-end encrypted service. If this person gives you consent to share this file, ensure that metadata has been [removed](https://www.privacyguides.org/en/data-redaction/) from it. This person might not be aware of the metadata on this file.
### :material-heart: Keep confidences secret
### Keep confidences secret
If someone trusts you enough to share something personal with you, do not betray that trust by talking about it with someone else, and *especially* not on unencrypted services such as Gmail or Twitter's DM. In doing so, you would expose this secret to even more unintended recipients. Respect people's trust in you. Do not share confidences.
### :material-message-text: Safeguard and delete private messages on social media
### Safeguard and delete private messages on social media
If you have private conversations on social media, be mindful not to spread this information elsewhere. If you delete your account, be mindful to also [delete](https://docs.cyd.social/docs/x/delete#delete-my-direct-messages) the information of others you have stored in your private messages. If someone wants to share sensitive information with you, always invite them to move to an end-to-end encrypted [messaging service](https://www.privacyguides.org/en/real-time-communication/) instead.
### :material-heart-box: Safeguard and delete intimate pictures you received
### Safeguard and delete intimate pictures you received
If someone trust you enough to send you intimate photos of themselves, take this responsibility *extremely* seriously. If they use an end-to-end encrypted service, do not move the photos out of there. If you do, you could inadvertently upload them to an unencrypted service and compromise the security of these pictures.
@@ -122,19 +122,19 @@ If your relationship with this person ends, you *should* delete all intimate pic
If you are still unconvinced about this one, maybe have a look at Ted Lasso season 3, [episode 8](https://screenrant.com/ted-lasso-season-3-episode-8-keeley-story-response/) which has a great story demonstrating the dangers related to this.
### :material-cellphone-screenshot: Avoid taking screenshot of people's posts
### Avoid taking screenshot of people's posts
Each time you take a screenshot of someone's post to repost it somewhere else, you are effectively removing this person's ability to delete their content later. This is horrible for privacy *and* for consent. Instead, use links to other people's posts. That way, if they decide later to delete their content, the link will simply not work anymore, but their right to deletion will remain intact.
### :material-record-circle: Notify guests if you are using a smart speaker
### Notify guests if you are using a smart speaker
If you are using a smart speaker device in your home such as Amazon's Echo (Alexa), Apple's HomePod (Siri), Google's Nest, inform your guests about it when they enter your home. These devices have the [capacity](https://www.makeuseof.com/tag/alexa-amazon-echo-privacy-risk/) to record all conversations, and there has already been instances of accidental privacy invasion [reported](https://www.cnet.com/home/smart-home/alexa-sent-private-audio-to-a-random-contact-portland-family-says/) about this. Even if you don't mind yourself, offer your guests to *unplug* your smart speaker while they are visiting you. The same is valid for any voice assistant on your phone.
### :material-eye-off: Do not use Windows Recall (or anything similar)
### Do not use Windows Recall (or anything similar)
If you are a Microsoft user, make sure to [*disable*](https://www.ytechb.com/how-to-uninstall-microsoft-recall-in-windows-11/) Windows Recall from your computer. If it's enabled, this application will [continuously](https://www.theverge.com/2024/6/3/24170305/microsoft-windows-recall-ai-screenshots-security-privacy-issues) take screenshots of your computer, including the faces of anyone video-chatting with you on Signal, the email content of anyone contacting your through Tuta Mail, the secrets of anyone chatting with you on Matrix. Windows Recall completely defeats the protections of anyone using end-to-end encryption to contact you. This is a huge breach of trust! If you somehow use this feature, at least be mindful to disable it each time you communicate with others.
### :fontawesome-solid-glasses: Don't use Meta's Ray-Ban "AI" glasses!
### Don't use Meta's Ray-Ban "AI" glasses!
Don't use "smart" glasses recording people.
+16 -16
View File
@@ -33,7 +33,7 @@ Once a YubiKey application is reset, this operation is irreversible and previous
</div>
## :material-shield-key: Why would you need to reset your YubiKey?
## Why would you need to reset your YubiKey?
Resetting your YubiKey *isn't* something you should be doing regularly.
@@ -63,7 +63,7 @@ Keeping a backup of your key is especially important for usages such as setting
Some services will allow you to register two or more *different* keys to authenticate your account, but other services might only allow you to register one. This is when you want to make sure your have a backup of this key.
## :material-toolbox: Requirements and preparation
## Requirements and preparation
For this tutorial you will need:
@@ -115,7 +115,7 @@ If you do not see the menu on the left (Home, Accounts, Passkeys, Certificates,
</div>
## :material-key-alert: Resetting your YubiKey to factory defaults
## Resetting your YubiKey to factory defaults
<div class="admonition info" markdown>
<p class="admonition-title">Disabling applications</p>
@@ -212,7 +212,7 @@ You can install **ykman CLI** using a package manager such as **pip** or **brew*
#### 6.1. Install ykman CLI
:material-monitor: From any OS, using the **pip** package manager:
From any OS, using the **pip** package manager:
Open a terminal application and type:
@@ -227,11 +227,11 @@ Yubico makes the **ykman CLI** Python program files available on its [website](h
</div>
:material-linux: From Linux (Ubuntu), using the Yubico developer's website:
From Linux (Ubuntu), using the Yubico developer's website:
On [this page](https://developers.yubico.com/yubikey-manager/Releases/), download the latest **`tar.gz`** file and decompress it. Run the **ykman** Python program using the command line from the directory you have installed it in.
:material-linux: From Linux (Ubuntu), using Yubico's **yubico/stable PPA** type:
From Linux (Ubuntu), using Yubico's **yubico/stable PPA** type:
Open a terminal application and type:
@@ -241,7 +241,7 @@ sudo apt update
sudo apt install yubikey-manager
```
:material-apple: From macOS, using the [Homebrew](https://brew.sh/) package manager:
From macOS, using the [Homebrew](https://brew.sh/) package manager:
Open a terminal application and type:
@@ -249,11 +249,11 @@ Open a terminal application and type:
brew install ykman
```
:material-apple: From macOS, using the Yubico developer's website:
From macOS, using the Yubico developer's website:
On [this page](https://developers.yubico.com/yubikey-manager/Releases/), download the latest **`mac.pkg`** file, then double-click on it to complete the installation.
:material-microsoft-windows: From Windows, using the Yubico developer's website:
From Windows, using the Yubico developer's website:
On [this page](https://developers.yubico.com/yubikey-manager/Releases/), download the latest **`win64.msi`** file, then double-click on it to complete the installation.
@@ -268,13 +268,13 @@ If you have chosen a different installation path from default, you will need to
</div>
:material-apple: From macOS, in the terminal navigate to:
From macOS, in the terminal navigate to:
``` console { .yaml .copy }
cd /Applications/Yubico\ Authenticator.app/Contents/MacOS/
```
:material-microsoft-windows: From Windows, in the command prompt navigate to:
From Windows, in the command prompt navigate to:
64-bit Systems:
@@ -355,7 +355,7 @@ You can use the **ykman CLI** program to do a lot more with your YubiKey. If you
</div>
## :material-key-change: Setting up and backing up of your YubiKeys
## Setting up and backing up of your YubiKeys
Now that you have a set of two freshly reset YubiKeys, we will set up your main key while creating a backup of each application that allows it to your spare key. The goal here is to create a spare key that you can safely keep as a backup, in the unfortunate event that you were to lose your main key.
@@ -385,7 +385,7 @@ Click on the "Change PUK" button and a section will pop up. Enter a new PUK numb
#### 7.4. Change the default Management key
Click on the "Management key" button and a section will pop up. Enter or generate a "New management key" with a maximum of 64 characters. You can also change the encryption algorithm to "TDES", "AES128", "AES192", or "AES256" and add a pin protection by clicking on "Protect with PIN". Then click "Save".
Click on the "Management key" button and a section will pop up. Enter or generate a "New management key" with a maximum of 64 characters. You can also change the encryption algorithm to "TDES", "AES128", "AES192", or "AES256" and add a pin protection by clicking on "Protect with PIN". Then click "Save".
![Screenshot of the Yubico Authenticator application showing a Change management key popup.](../assets/images/yubikey-reset-and-backup/yubikey-17-config-certificateskey.webp)
@@ -775,7 +775,7 @@ Only look at the last "key block" listed, and note its **key ID**. Each "key blo
Your OpenPGP **key ID** will be a string of numbers and uppercase letters on the **`pub`** line, after the "rsa4096" key type, and separated by a **/** character as follows:
``` console
pub rsa4096/[key_id]
pub rsa4096/[key_id]
```
Note this **[key_id]** for the next steps.
@@ -809,7 +809,7 @@ addkey
When prompted with "Please select what kind of key you want" type `8`.
You will be asked to toggle on or off some subkey options. Here, we will generate all 3 subkeys at once, but adjust this step to your required usage. You might also need different encryption algorithms for different subkeys (see options available from the previous **`gpg`** program question).
You will be asked to toggle on or off some subkey options. Here, we will generate all 3 subkeys at once, but adjust this step to your required usage. You might also need different encryption algorithms for different subkeys (see options available from the previous **`gpg`** program question).
<div class="admonition tip" markdown>
<p class="admonition-title">To generate subkeys separately</p>
@@ -1071,7 +1071,7 @@ If you need additional help to troubleshoot, reset, setup, or copy information t
</div>
## :material-key-chain: Review your configuration
## Review your configuration
Once you have fully reset and reconfigured your 2 YubiKeys, make sure that you have:
@@ -9,7 +9,7 @@ description: These tools allow you to access networks other than the World Wide
## Anonymizing Networks
When it comes to anonymizing networks, we want to specially note that [Tor](../../../wiki/advanced/tor-overview/index.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your [:material-incognito: Anonymity](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple }, unless you know what you're doing.
When it comes to anonymizing networks, we want to specially note that [Tor](../../../wiki/advanced/tor-overview/index.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your [Anonymity](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple }, unless you know what you're doing.
<div class="pg-card-logos">
{{< cards >}}
@@ -22,7 +22,7 @@ When it comes to anonymizing networks, we want to specially note that [Tor](../.
### Tor
The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective [:material-close-outline: Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray } circumvention tool.
The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective [Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray } circumvention tool.
{{< cards >}}
{{< card link="https://torproject.org" title="Homepage" icon="home" >}}
@@ -31,10 +31,10 @@ The **Tor** network is a group of volunteer-operated servers that allows you to
The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page:
[Tor Browser Info :material-arrow-right-drop-circle:](../../software/tor/index.md)
[Tor Browser Info](../../software/tor/index.md)
{ .pg:buttons }
[Detailed Tor Overview :material-arrow-right-drop-circle:](../../../wiki/advanced/tor-overview/index.md)
[Detailed Tor Overview](../../../wiki/advanced/tor-overview/index.md)
{ .pg:buttons }
You can access the Tor network using other tools; making this determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile.
@@ -60,7 +60,7 @@ We previously recommended enabling the *Isolate Destination Address* preference
=== "Android"
Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN kill switch in :gear: **Settings****Network & internet****VPN**:gear:**Block connections without VPN**.
Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN kill switch in **Settings****Network & internet****VPN**Settings**Block connections without VPN**.
Orbot is often outdated on Google Play and the Guardian Project's F-Droid repository, so consider downloading directly from the GitHub repository instead. All versions are signed using the same signature, so they should be compatible with each other.
@@ -81,7 +81,7 @@ People who are censored can use Snowflake proxies to connect to the Tor network.
You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface.
[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html)
[Run Snowflake in your Browser](https://snowflake.torproject.org/embed.html)
{ .pg:buttons }
Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours.
@@ -16,16 +16,15 @@ The mobile devices listed here provide a long lifespan of guaranteed security up
{{< /cards >}}
</div>
[Recommended Android Distributions :material-arrow-right-drop-circle:](../../os/android/distributions/index.md)
[Recommended Android Distributions](../../os/android/distributions/index.md)
{ .pg:buttons }
[Details about Android Security :material-arrow-right-drop-circle:](../../os/android/_index.md#security-protections)
[Details about Android Security](../../os/android/_index.md#security-protections)
{ .pg:buttons }
> [!WARNING]
> End-of-life devices (such as GrapheneOS's "extended support" devices) do not have full security patches (firmware updates) due to the OEM discontinuing support. These devices cannot be considered completely secure regardless of installed software.
## General Purchasing Advice
When purchasing a device, we recommend getting one as new as possible. The software and firmware of mobile devices are only supported for a limited time, so buying new extends that lifespan as much as possible.
+1 -2
View File
@@ -140,7 +140,6 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh
> [!WARNING]
> Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time.
Tails is great for counter forensics due to amnesia (meaning nothing is written to the disk); however, it is not a hardened distribution like Whonix. It lacks many anonymity and security features that Whonix has and gets updated much less often (only once every six weeks). A Tails system that is compromised by malware may potentially bypass the transparent proxy, allowing for the user to be deanonymized.
Tails includes [uBlock Origin](../../software/browser-extensions/index.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device.
@@ -206,4 +205,4 @@ Choosing a Linux distro that is right for you will come down to a huge variety o
In addition, [our standard criteria](../../../about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.**
[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](../../../wiki/basics/common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian }.
[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [Supply Chain Attacks](../../../wiki/basics/common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian }.
@@ -53,7 +53,7 @@ Once you have opted-out of all of these sites for the first time, it's best to w
Otherwise, privacy journalist Yael Grauer has compiled an excellent list of data broker sites with direct links to their search tools and opt-out pages. You can take some time to go through each site to determine whether they have your information, and remove it:
[:simple-github: Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
[Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
{ .pg:buttons }
If you don't use an automatic scanner to find results about you, consider setting a reminder to re-do this process every 3, 6, or 12 months depending on your risk level and the amount of personal data you have out there. Unfortunately, it is common for your data to re-appear over time or show up on brand-new people search sites even after you opt out.
+5 -6
View File
@@ -24,11 +24,11 @@ These are our favorite public DNS resolvers based on their privacy and security
| DNS Provider | Protocols | Logging / Privacy Policy | [ECS](../../../wiki/advanced/dns-overview/index.md#what-is-edns-client-subnet-ecs) | Filtering | Signed Apple Profile |
|---|---|---|---|---|---|
| [**AdGuard Public DNS**](https://adguard-dns.io/en/public-dns.html) | Cleartext <br>DoH/3 <br>DoT <br>DoQ <br>DNSCrypt | Anonymized[^1] | Anonymized | Based on server choice. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardSDNSFilter) | Yes [:octicons-link-external-24:](https://adguard-dns.io/en/blog/encrypted-dns-ios-14.html) |
| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | Cleartext <br>DoH/3 <br>DoT | Anonymized[^2] | No | Based on server choice. | No [:octicons-link-external-24:](https://community.cloudflare.com/t/requesting-1-1-1-1-signed-profiles-for-apple/571846) |
| [**Control D Free DNS**](https://controld.com/free-dns) | Cleartext <br>DoH/3 <br>DoT <br>DoQ | No[^3] | No | Based on server choice. | Yes <br>[:simple-apple: iOS](https://docs.controld.com/docs/ios-platform) <br>[:material-apple-finder: macOS](https://docs.controld.com/docs/macos-platform#manual-setup-profile) |
| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | DoH <br>DoT | No[^4] | No | Based on server choice. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | Yes [:octicons-link-external-24:](https://github.com/mullvad/encrypted-dns-profiles) |
| [**Quad9**](https://quad9.net) | Cleartext <br>DoH/3 <br>DoT <br>DoQ <br>DNSCrypt | Anonymized[^5] | Optional | Based on server choice. Malware blocking is included by default. | Yes <br>[:simple-apple: iOS](https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_(Encrypted)) <br>[:material-apple-finder: macOS](https://docs.quad9.net/Setup_Guides/MacOS/Big_Sur_and_later_(Encrypted)) |
| [**AdGuard Public DNS**](https://adguard-dns.io/en/public-dns.html) | Cleartext <br>DoH/3 <br>DoT <br>DoQ <br>DNSCrypt | Anonymized[^1] | Anonymized | Based on server choice. Filter list being used can be found here. [Link](https://github.com/AdguardTeam/AdGuardSDNSFilter) | Yes [Link](https://adguard-dns.io/en/blog/encrypted-dns-ios-14.html) |
| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | Cleartext <br>DoH/3 <br>DoT | Anonymized[^2] | No | Based on server choice. | No [Link](https://community.cloudflare.com/t/requesting-1-1-1-1-signed-profiles-for-apple/571846) |
| [**Control D Free DNS**](https://controld.com/free-dns) | Cleartext <br>DoH/3 <br>DoT <br>DoQ | No[^3] | No | Based on server choice. | Yes <br>[iOS](https://docs.controld.com/docs/ios-platform) <br>[macOS](https://docs.controld.com/docs/macos-platform#manual-setup-profile) |
| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | DoH <br>DoT | No[^4] | No | Based on server choice. Filter list being used can be found here. [Link](https://github.com/mullvad/dns-adblock) | Yes [Link](https://github.com/mullvad/encrypted-dns-profiles) |
| [**Quad9**](https://quad9.net) | Cleartext <br>DoH/3 <br>DoT <br>DoQ <br>DNSCrypt | Anonymized[^5] | Optional | Based on server choice. Malware blocking is included by default. | Yes <br>[iOS](https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_(Encrypted)) <br>[macOS](https://docs.quad9.net/Setup_Guides/MacOS/Big_Sur_and_later_(Encrypted)) |
[^1]:
AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested within the last 24 hours.
@@ -132,7 +132,6 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot
> [!WARNING]
> The anonymized DNS feature does [not](../../../wiki/advanced/dns-overview/index.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic.
## Criteria
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](../../../about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
+29 -30
View File
@@ -23,13 +23,13 @@ For everything else, we recommend a variety of email providers based on sustaina
| Provider | OpenPGP / WKD | IMAP / SMTP | Encrypted Storage | Anonymous Payment Methods |
|---|---|---|---|---|
| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | Cash <br>Monero via third party |
| [Mailbox Mail](#mailbox-mail) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash |
| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero via third party <br>Cash via third party |
| [Proton Mail](#proton-mail) | Yes | Paid plans only | Yes | Cash <br>Monero via third party |
| [Mailbox Mail](#mailbox-mail) | Yes | Yes | Mail only | Cash |
| [Tuta](#tuta) | Partial | Partial | Yes | Monero via third party <br>Cash via third party |
In addition to (or instead of) an email provider recommended here, you may wish to consider a dedicated [email aliasing service](../email-aliasing/index.md#recommended-providers) to protect your privacy. Among other things, these services can help protect your real inbox from spam, prevent marketers from correlating your accounts, and encrypt all incoming messages with PGP.
- [More Information :material-arrow-right-drop-circle:](../email-aliasing/index.md)
- [More Information](../email-aliasing/index.md)
## OpenPGP Compatible Services
@@ -44,12 +44,11 @@ These providers natively support OpenPGP encryption/decryption and the [Web Key
> [!WARNING]
> When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](../../../wiki/basics/email-security/index.md#email-metadata-overview).
>
>
> OpenPGP also does not support forward secrecy, which means if the private key of either you or the message recipient is ever stolen, all previous messages encrypted with it will be exposed.
>
>
> - [How do I protect my private keys?](../../../wiki/basics/email-security/index.md#how-do-i-protect-my-private-keys)
### Proton Mail
**Proton Mail** is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland.
@@ -77,47 +76,47 @@ Proton Mail has internal crash reports that are **not** shared with third partie
=== "Web"
From your inbox, select :gear:**All Settings****Account****Security and privacy****Privacy and data collection**.
From your inbox, select Settings**All Settings****Account****Security and privacy****Privacy and data collection**.
- [ ] Disable **Collect usage dignostics**
- [ ] Disable **Send crash reports**
=== "Mobile"
From your inbox, select :material-menu: :gear: **Settings** → select your username.
From your inbox, select the menu → **Settings** → select your username.
- [ ] Disable **Send crash reports**
- [ ] Disable **Collect usage dignostics**
#### :material-check:{ .pg-green } Custom Domains and Aliases
#### Custom Domains and Aliases
Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain.
#### :material-check:{ .pg-green } Private Payment Methods
#### Private Payment Methods
Proton Mail [accepts](https://proton.me/support/payment-options) **cash** by mail in addition to standard credit/debit card, [Bitcoin](../../../wiki/advanced/payments/index.md#other-coins-bitcoin-ethereum-etc), and PayPal payments. Additionally, you can use [**Monero**](../../software/cryptocurrency/index.md#monero) to purchase vouchers for Proton Mail Plus or Proton Unlimited via their [official](https://discuss.privacyguides.net/t/add-monero-as-an-anonymous-payment-method-for-proton-services/31058/15) reseller [ProxyStore](https://dys2p.com/en/2025-09-09-proton.html).
#### :material-check:{ .pg-green } Account Security
#### Account Security
Proton Mail supports TOTP [two-factor authentication](https://proton.me/support/two-factor-authentication-2fa) and [hardware security keys](https://proton.me/support/2fa-security-key) using FIDO2 or U2F standards. The use of a hardware security key requires setting up TOTP two-factor authentication first.
#### :material-check:{ .pg-green } Data Security
#### Data Security
Proton Mail stores your [emails](https://proton.me/blog/zero-access-encryption) and [calendars](https://proton.me/news/protoncalendar-security-model) with PGP-based encryption at rest, where only you have the decryption keys needed to access them later.
Certain information stored in [Proton Contacts](https://proton.me/support/proton-contacts), such as display names and email addresses, are **not** secured with your own encryption keys, so Proton is able to read them. Contact fields which are protected with your own encryption keys, such as phone numbers, are indicated with a padlock icon.
#### :material-check:{ .pg-green } Email Encryption
#### Email Encryption
Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with WKD. This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to [encrypt messages to non-Proton Mail addresses without OpenPGP](https://proton.me/support/password-protected-emails), without the need for them to sign up for a Proton Mail account.
Proton Mail also publishes the public keys of Proton accounts via HTTP from their WKD. This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Proton's own domains, like `@proton.me`. If you use a custom domain, you must [configure WKD](../../../wiki/basics/email-security/index.md#what-is-the-web-key-directory-standard) separately.
#### :material-information-outline:{ .pg-blue } Account Termination
#### Account Termination
If you have a paid account and your [bill is unpaid](https://proton.me/support/delinquency) after 14 days, you won't be able to access your data. After 30 days, your account will become delinquent and won't receive incoming mail. You will continue to be billed during this period. Proton will [delete inactive free accounts](https://proton.me/support/inactive-accounts) after one year. You **cannot** reuse the email address of a deactivated account.
#### :material-information-outline:{ .pg-blue } Additional Functionality
#### Additional Functionality
Proton Mail's [Unlimited](https://proton.me/support/proton-plans#proton-unlimited) plan also enables access to other Proton services in addition to providing multiple custom domains, unlimited hide-my-email aliases, and 500 GB of storage.
@@ -134,35 +133,35 @@ Accounts start with up to 2 GB storage, which can be upgraded as needed.
[{{< badge content="Web" >}}](https://login.mailbox.org)
#### :material-check:{ .pg-green } Custom Domains and Aliases
#### Custom Domains and Aliases
Mailbox Mail lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/use-your-own-domain-with-catch-all/) addresses. Mailbox Mail also supports [sub-addressing](https://kb.mailbox.org/en/private/e-mail/what-is-an-alias-and-how-do-i-use-it/), which is useful if you don't want to purchase a domain.
#### :material-check:{ .pg-green } Private Payment Methods
#### Private Payment Methods
Mailbox Mail doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept **cash** by mail, **cash** payment to bank account, bank transfer, credit card, PayPal, and a couple of German-specific processors: Paydirekt and Sofortüberweisung.
#### :material-check:{ .pg-green } Account Security
#### Account Security
Mailbox Mail supports [two-factor authentication](https://kb.mailbox.org/en/private/security-and-privacy/how-to-use-two-factor-authentication-2fa/) for their webmail only. You can use either TOTP or a [YubiKey](../../hardware/security-keys/index.md#yubikey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](../../../wiki/basics/multi-factor-authentication/index.md#fido-fast-identity-online) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
#### Data Security
Mailbox Mail allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/encryption/your-encrypted-mailbox/). New messages that you receive will then be immediately encrypted with your public key.
However, [Open-Xchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox Mail, [does not support](https://kb.mailbox.org/en/business/security-privacy-article/encryption-of-calendar-and-address-book/) the encryption of your address book and calendar. A [standalone option](../calendar/index.md) may be more appropriate for that data.
#### :material-check:{ .pg-green } Email Encryption
#### Email Encryption
Mailbox Mail has [integrated encryption](https://kb.mailbox.org/en/private/encryption/how-can-e-mails-be-encrypted-with-pgp/) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/encryption/my-recipient-does-not-use-pgp/) on Mailbox Mail's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.
Mailbox Mail also supports the discovery of public keys via HTTP from their WKD. This allows people outside of Mailbox Mail to find the OpenPGP keys of Mailbox Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox Mail's own domains, like `@mailbox.org`. If you use a custom domain, you must [configure WKD](../../../wiki/basics/email-security/index.md#what-is-the-web-key-directory-standard) separately.
#### :material-information-outline:{ .pg-blue } Account Termination
#### Account Termination
Your account will be set to a restricted user account when your contract ends. It will be irrevocably deleted after [30 days](https://kb.mailbox.org/en/en/private/account/reactivate-a-deleted-account/).
#### :material-information-outline:{ .pg-blue } Additional Functionality
#### Additional Functionality
You can access your Mailbox Mail account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/en/private/security-privacy/using-the-tor-exit-node-from-mailbox/). However, their webmail interface cannot be accessed via their .onion service, and you may experience TLS certificate errors.
@@ -201,31 +200,31 @@ Free accounts start with 1 GB of storage.
Tuta doesn't support the [IMAP protocol](https://tuta.com/support#imap) or the use of third-party [email clients](../../software/email-clients/index.md), and you also won't be able to add [external email accounts](https://github.com/tutao/tutanota/issues/544#issuecomment-670473647) to the Tuta app. [Email import](https://github.com/tutao/tutanota/issues/630) is not currently supported either, though this is [due to be changed](https://tuta.com/blog/kickoff-import). Emails can be exported [individually or by bulk selection](https://tuta.com/support#generalMail) per folder, which may be inconvenient if you have many folders.
#### :material-check:{ .pg-green } Custom Domains and Aliases
#### Custom Domains and Aliases
Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/support#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/support#plus), but you can use a [catch-all](https://tuta.com/support#settings-global) with a custom domain.
#### :material-information-outline:{ .pg-blue } Private Payment Methods
#### Private Payment Methods
Tuta only directly accepts credit cards and PayPal, however you can use [**cryptocurrency**](../../software/cryptocurrency/index.md) to purchase gift cards via their [partnership](https://tuta.com/support/#cryptocurrency) with ProxyStore.
#### :material-check:{ .pg-green } Account Security
#### Account Security
Tuta supports [two-factor authentication](https://tuta.com/support#2fa) with either TOTP or U2F.
#### :material-check:{ .pg-green } Data Security
#### Data Security
Tuta stores your [emails](https://tuta.com/support#what-encrypted), [address book contacts](https://tuta.com/support#encrypted-address-book), and [calendars](https://tuta.com/support#calendar) with strong encryption where only you have the decryption keys. This means the messages and other data stored in your account cannot be read by anyone other than you after they are stored.
#### :material-information-outline:{ .pg-blue } Email Encryption
#### Email Encryption
Tuta [does not use OpenPGP](https://tuta.com/support/#pgp). Tuta accounts can only receive encrypted emails from non-Tuta email accounts when sent via a [temporary Tuta mailbox](https://tuta.com/support/#encrypted-email-external).
#### :material-information-outline:{ .pg-blue } Account Termination
#### Account Termination
Tuta will [delete inactive free accounts](https://tuta.com/support#inactive-accounts) after six months. You can reuse a deactivated free account if you pay.
#### :material-information-outline:{ .pg-blue } Additional Functionality
#### Additional Functionality
Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/secure-email-for-non-profit) for free or with a heavy discount.
+3 -3
View File
@@ -60,7 +60,7 @@ The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf)
### Molly (Android)
If you use Android and your threat model requires protecting against [:material-target-account: Targeted Attacks](../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals){ .pg-red } you may consider using this alternative app, which features a number of security and usability improvements, to access the Signal network.
If you use Android and your threat model requires protecting against [Targeted Attacks](../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals){ .pg-red } you may consider using this alternative app, which features a number of security and usability improvements, to access the Signal network.
**Molly** is an alternative Signal client for Android which allows you to encrypt the local database with a passphrase at rest, to have unused RAM data securely shredded, to route your connection via Tor, and [more](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening#privacy-and-security-features). It also has usability improvements including scheduled backups, automatic locking, and the ability to use your Android phone as a linked device instead of the primary device for a Signal account.
@@ -83,7 +83,7 @@ Both versions of Molly provide the same security improvements and support [repro
## SimpleX Chat
**SimpleX Chat** is an instant messenger that doesn't depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against [:material-close-outline: Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray }.
**SimpleX Chat** is an instant messenger that doesn't depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against [Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray }.
{{< cards >}}
{{< card link="https://simplex.chat" title="Homepage" icon="home" >}}
@@ -108,7 +108,7 @@ SimpleX Chat was independently audited in [July 2024](https://simplex.chat/blog/
## Briar
**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the [Tor network](../../advanced/alternative-networks/index.md#tor), making it an effective tool at circumventing [:material-close-outline: Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray }. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briars local mesh mode can be useful when internet availability is a problem.
**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the [Tor network](../../advanced/alternative-networks/index.md#tor), making it an effective tool at circumventing [Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray }. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briars local mesh mode can be useful when internet availability is a problem.
{{< cards >}}
{{< card link="https://briarproject.org" title="Homepage" icon="home" >}}
@@ -25,9 +25,9 @@ Consider using a [VPN](../vpn/index.md) or [Tor](../../software/tor/index.md) if
| Provider | Search Index | Tor Hidden Service | Logging / Privacy Policy | Country of Operation |
|---|---|---|---|---|
| [Brave Search](#brave-search) | [Independent](https://brave.com/search-independence) | :material-check:{ .pg-green } | Anonymized[^1] | United States |
| [DuckDuckGo](#duckduckgo) | [Bing](https://help.duckduckgo.com/results/sources) | :material-check:{ .pg-green } | Anonymized[^2] | United States |
| [Startpage](#startpage) | [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) | :material-check:{ .pg-green } | Anonymized[^3] | Netherlands |
| [Brave Search](#brave-search) | [Independent](https://brave.com/search-independence) | Yes | Anonymized[^1] | United States |
| [DuckDuckGo](#duckduckgo) | [Bing](https://help.duckduckgo.com/results/sources) | Yes | Anonymized[^2] | United States |
| [Startpage](#startpage) | [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) | Yes | Anonymized[^3] | Netherlands |
[^1]:
Brave Search collects aggregated usage metrics, which includes the OS and the user agent. However, they do not collect PII. To serve [anonymous local results](https://search.brave.com/help/anonymous-local-results), IP addresses are temporarily processed, but are not retained.
+33 -33
View File
@@ -30,9 +30,9 @@ Our recommended providers use encryption, support WireGuard & OpenVPN, and have
| Provider | Countries | WireGuard | Port Forwarding | IPv6 | Anonymous Payments |
|---|---|---|---|---|---|
| [Proton](#proton-vpn) | 127+ | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } Partial Support | :material-information-outline:{ .pg-blue } Limited Support | Cash |
| [IVPN](#ivpn) | 41+ | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } | :material-information-outline:{ .pg-blue } Outgoing Only | Monero Cash |
| [Mullvad](#mullvad) | 49+ | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero Cash |
| [Proton](#proton-vpn) | 127+ | Yes | Partial Support | Limited Support | Cash |
| [IVPN](#ivpn) | 41+ | Yes | No | Outgoing Only | Monero Cash |
| [Mullvad](#mullvad) | 49+ | Yes | No | Yes | Monero Cash |
### Proton VPN
@@ -50,7 +50,7 @@ Our recommended providers use encryption, support WireGuard & OpenVPN, and have
[{{< badge content="App Store" color="blue" >}}](https://apps.apple.com/app/id1437005085)
[{{< badge content="GitHub" >}}](https://github.com/ProtonVPN/android-app/releases)
#### :material-check:{ .pg-green } 127 Countries
#### 127 Countries
Proton VPN has [servers in 127 countries](https://protonvpn.com/vpn-servers)(1) or [10](https://protonvpn.com/support/how-to-create-free-vpn-account) if you use their [free plan](https://protonvpn.com/blog/product-roadmap-winter-2025-2026).(2) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
{ .annotate }
@@ -60,48 +60,48 @@ Proton VPN has [servers in 127 countries](https://protonvpn.com/vpn-servers)(1)
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
#### :material-check:{ .pg-green } Independently Audited
#### Independently Audited
Independent security researcher Ruben Santamarta conducted audits for Proton VPN's [browser extensions](https://drive.proton.me/urls/RWDD2SHT98#v7ZrwNcafkG8) and [apps](https://drive.proton.me/urls/RVW8TXG484#uTXX5Fc9GADo) in September 2024 and January 2025, respectively. Proton VPN's infrastrcture has undergone [annual audits](https://protonvpn.com/blog/no-logs-audit) by Securitum since 2022.
Previously, Proton VPN underwent an independent audit by SEC Consult in January 2020. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform in their dedicated [blog post](https://web.archive.org/web/20250307041036/https://protonvpn.com/blog/open-source) on the audit.
#### :material-check:{ .pg-green } Open-Source Clients
#### Open-Source Clients
Proton VPN provides the source code for their desktop and mobile clients in their [GitHub organization](https://github.com/ProtonVPN).
#### :material-check:{ .pg-green } Accepts Cash
#### Accepts Cash
Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](../../../wiki/advanced/payments/index.md#other-coins-bitcoin-ethereum-etc), also accepts **cash/local currency** as an anonymous form of payment.
#### :material-check:{ .pg-green } WireGuard Support
#### WireGuard Support
Proton VPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant.
Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. Proton VPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install).
#### :material-alert-outline:{ .pg-orange } Limited IPv6 Support
#### Limited IPv6 Support
Proton [now supports IPv6](https://protonvpn.com/support/prevent-ipv6-vpn-leaks) in their browser extension and Linux client, but only 80% of their servers are IPv6-compatible. On other platforms, the Proton VPN client will block all outgoing IPv6 traffic, so you don't have to worry about your IPv6 address being leaked, but you will not be able to connect to any IPv6-only sites, nor will you be able to connect to Proton VPN from an IPv6-only network.
#### :material-information-outline:{ .pg-info } Remote Port Forwarding
#### Remote Port Forwarding
Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The official Windows and Linux apps provide an easy-to-access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively.
#### :material-information-outline:{ .pg-blue } Anti-Censorship
#### Anti-Censorship
Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or WireGuard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic.
Unfortunately, it does not work very well in countries where sophisticated filters that analyze all outgoing traffic in an attempt to discover encrypted tunnels are deployed. Stealth is available on Android, iOS, Windows, and macOS, but it's not yet available on Linux.
#### :material-check:{ .pg-green } Mobile Clients
#### Mobile Clients
Proton VPN has published [App Store](https://apps.apple.com/app/id1437005085) and [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/ProtonVPN/android-app/releases).
> [!TIP]
> On Android, Proton hides telemetry settings under the misleadingly labeled "**Help us fight censorship**" menu in the settings panel. On other platforms these settings can be found under the "**Usage statistics**" menu. We are noting this because while we don't necessarily recommend against sharing anonymous usage statistics with developers, it is important that these settings are easily found and clearly labeled.
#### :material-alert-outline:{ .pg-orange } Additional Notes
#### Additional Notes
Proton VPN clients support two-factor authentication on all platforms. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](../../software/tor/index.md#tor-browser) for this purpose.
@@ -128,7 +128,7 @@ Additionally, system crashes [may occur](https://protonvpn.com/support/macos-t2-
[{{< badge content="Accrescent" >}}](https://accrescent.app/app/net.ivpn.client)
[{{< badge content="GitHub" >}}](https://github.com/ivpn/android-app/releases)
#### :material-check:{ .pg-green } 41 Countries
#### 41 Countries
IVPN has [servers in 41 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
{ .annotate }
@@ -137,41 +137,41 @@ IVPN has [servers in 41 countries](https://ivpn.net/status).(1) Picking a VPN pr
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
#### :material-check:{ .pg-green } Independently Audited
#### Independently Audited
IVPN has had multiple [independent audits](https://ivpn.net/en/blog/tags/audit) since 2019 and has publicly announced their commitment to [annual security audits](https://ivpn.net/blog/ivpn-apps-security-audit-concluded).
#### :material-check:{ .pg-green } Open-Source Clients
#### Open-Source Clients
As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn).
#### :material-check:{ .pg-green } Accepts Cash and Monero
#### Accepts Cash and Monero
In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, **Monero** and **cash/local currency** (on annual plans) as anonymous forms of payment. You can also purchase [prepaid cards](https://ivpn.net/knowledgebase/billing/voucher-cards-faq) with redeem codes.
#### :material-check:{ .pg-green } WireGuard Support
#### WireGuard Support
IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant.
IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install).
#### :material-information-outline:{ .pg-blue } IPv6 Support
#### IPv6 Support
IVPN allows you to [connect to services using IPv6](https://ivpn.net/knowledgebase/general/do-you-support-ipv6) but doesn't allow you to connect from a device using an IPv6 address.
#### :material-alert-outline:{ .pg-orange } Remote Port Forwarding
#### Remote Port Forwarding
IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients.
#### :material-check:{ .pg-green } Anti-Censorship
#### Anti-Censorship
IVPN has obfuscation modes using [V2Ray](https://v2ray.com/en/index) which helps in situations where VPN protocols like OpenVPN or WireGuard are blocked. It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic.
#### :material-check:{ .pg-green } Mobile Clients
#### Mobile Clients
IVPN has published [App Store](https://apps.apple.com/app/id1193122683) and [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/ivpn/android-app/releases).
#### :material-information-outline:{ .pg-blue } Additional Notes
#### Additional Notes
IVPN clients support two-factor authentication. IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level.
@@ -191,7 +191,7 @@ IVPN clients support two-factor authentication. IVPN also provides "[AntiTracker
[{{< badge content="App Store" color="blue" >}}](https://apps.apple.com/app/id1488466513)
[{{< badge content="GitHub" >}}](https://github.com/mullvad/mullvadvpn-app/releases)
#### :material-check:{ .pg-green } 49 Countries
#### 49 Countries
Mullvad has [servers in 49 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
{ .annotate }
@@ -200,34 +200,34 @@ Mullvad has [servers in 49 countries](https://mullvad.net/servers).(1) Picking a
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
#### :material-check:{ .pg-green } Independently Audited
#### Independently Audited
Mullvad has had multiple [independent audits](https://mullvad.net/en/blog/tag/audits) and has publicly announced their endeavors to conduct [annual audits](https://mullvad.net/en/blog/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) of their apps and infrastructure.
#### :material-check:{ .pg-green } Open-Source Clients
#### Open-Source Clients
Mullvad provides the source code for their desktop and mobile clients in their [GitHub organization](https://github.com/mullvad/mullvadvpn-app).
#### :material-check:{ .pg-green } Accepts Cash and Monero
#### Accepts Cash and Monero
Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, **Monero** and **cash/local currency** as anonymous forms of payment. You can also purchase [prepaid cards](https://mullvad.net/en/help/partnerships-and-resellers) with redeem codes. Mullvad also accepts Swish and bank wire transfers, as well as a few European payment systems.
#### :material-check:{ .pg-green } WireGuard Support
#### WireGuard Support
Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant.
Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the only protocol supported on their mobile apps, and their desktop apps will [lose OpenVPN support](https://mullvad.net/en/blog/reminder-that-openvpn-is-being-removed) in 2025. Additionally, their servers will stop accepting OpenVPN connections by January 15, 2026.
Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install).
#### :material-check:{ .pg-green } IPv6 Support
#### IPv6 Support
Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support) and connect from a device using an IPv6 address.
#### :material-alert-outline:{ .pg-orange } Remote Port Forwarding
#### Remote Port Forwarding
Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients.
#### :material-check:{ .pg-green } Anti-Censorship
#### Anti-Censorship
Mullvad offers several features to help bypass censorship and access the internet freely:
@@ -236,11 +236,11 @@ Mullvad offers several features to help bypass censorship and access the interne
- **Custom server IPs**: To counter IP-blocking, you can request custom server IPs from Mullvad's support team. Once you receive the custom IPs, you can input the text file in the "Server IP override" settings, which will override the chosen server IP addresses with ones that aren't known to the censor.
- **Bridges and proxies**: Mullvad also allows you to use bridges or proxies to reach their API (needed for authentication), which can help bypass censorship attempts that block access to the API itself.
#### :material-check:{ .pg-green } Mobile Clients
#### Mobile Clients
Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases).
#### :material-information-outline:{ .pg-blue } Additional Notes
#### Additional Notes
Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They also provide the option to enable Defense Against AI-guided Traffic Analysis ([DAITA](https://mullvad.net/en/blog/daita-defense-against-ai-guided-traffic-analysis)) in their apps. DAITA protects against the threat of advanced traffic analysis which can be used to connect patterns in VPN traffic with specific websites.
+7 -7
View File
@@ -39,7 +39,7 @@ To run AI locally, you need both an AI model and an AI client.
There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_(deep_learning)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware.
To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards).
To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards).
## AI Chat Clients
@@ -53,12 +53,12 @@ To help you choose a model that fits your needs, you can look at leaderboards an
| Feature | [Kobold.cpp](#koboldcpp) | [Ollama](#ollama-cli) | [Llamafile](#llamafile) |
|---|---|---|---|
| GPU Support | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-check:{ .pg-green } |
| Image Generation | :material-check:{ .pg-green } | :material-close:{ .pg-red } | :material-close:{ .pg-red } |
| Speech Recognition | :material-check:{ .pg-green } | :material-close:{ .pg-red } | :material-close:{ .pg-red } |
| Auto-download Models | :material-close:{ .pg-red } | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } Few models available |
| Custom Parameters | :material-check:{ .pg-green } | :material-close:{ .pg-red } | :material-check:{ .pg-green } |
| Multi-platform | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } Size limitations on Windows |
| GPU Support | Yes | Yes | Yes |
| Image Generation | Yes | No | No |
| Speech Recognition | Yes | No | No |
| Auto-download Models | No | Yes | Partial |
| Custom Parameters | Yes | No | Yes |
| Multi-platform | Yes | Yes | Partial |
### Kobold.cpp
@@ -49,7 +49,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a limit
- ...you want a more resource (memory/CPU) efficient content blocker[^1]
- ...your browser only supports Manifest V3 extensions. This is the case for Chrome [^2] , Edge and most Chromium browsers.
**uBlock Origin Lite** is a Manifest V3 compatible content blocker. Compared to the original *uBlock Origin*, this extension does not require broad "read/modify data" permissions to function, which lowers the risk of [:material-bug-outline: Passive Attacks](../../../wiki/basics/common-threats/index.md#security-and-privacy){ .pg-orange } on your browser if a malicious rule is added to a filter list.
**uBlock Origin Lite** is a Manifest V3 compatible content blocker. Compared to the original *uBlock Origin*, this extension does not require broad "read/modify data" permissions to function, which lowers the risk of [Passive Attacks](../../../wiki/basics/common-threats/index.md#security-and-privacy){ .pg-orange } on your browser if a malicious rule is added to a filter list.
{{< cards >}}
{{< card link="https://github.com/uBlockOrigin/uBOL-home#readme" title="Repository" icon="code" >}}
@@ -22,7 +22,7 @@ Making payments online is one of the biggest challenges to privacy. These crypto
## Monero
**Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve [:material-incognito: Anonymity](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple }. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices.
**Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve [Anonymity](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple }. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices.
{{< cards >}}
{{< card link="https://getmonero.org" title="Homepage" icon="home" >}}
@@ -10,7 +10,6 @@ When sharing files, be sure to remove associated metadata. Image files commonly
> [!WARNING]
> You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, you should draw a box over the text.
<div class="pg-card-logos">
{{< cards >}}
{{< card link="#mat2" title="MAT2" image="./mat2.svg" subtitle="MAT2 is free, cross-platform software which allows you to remove metadata from image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for Dolphin, the default file manager of KDE." >}}
@@ -68,10 +67,10 @@ The app offers multiple ways to erase metadata from images. Namely:
On iOS and macOS, you can remove image metadata without using any third-party apps by creating a [**shortcut**](https://apps.apple.com/app/id915249334) for this purpose. Here is an example shortcut you can download to use as is:
[:material-tag-minus: Clean Image Metadata](https://icloud.com/shortcuts/fb774ddb7b5b4296871776c67ac0fff9)
[Clean Image Metadata](https://icloud.com/shortcuts/fb774ddb7b5b4296871776c67ac0fff9)
{ .pg:buttons }
You can also use it as a model for your own shortcut; just make sure that the **Preserve Metadata** option under the **Convert** action is unchecked. Once added, you can access the shortcut in the share sheet that appears when you select the :octicons-share-24: Share button. You can select multiple images and invoke the shortcut to remove their metadata all at once.
You can also use it as a model for your own shortcut; just make sure that the **Preserve Metadata** option under the **Convert** action is unchecked. Once added, you can access the shortcut in the share sheet that appears when you select the Share Share button. You can select multiple images and invoke the shortcut to remove their metadata all at once.
This shortcut removes metadata such as location, device model, lens model, and other camera information. It also sets the image creation date to the time the shortcut was used.
@@ -19,7 +19,7 @@ If you need to browse the internet anonymously, you should use [Tor](../tor/inde
## Mullvad Browser
**Mullvad Browser** is a version of [Tor Browser](../tor/index.md#tor-browser) with Tor network integrations removed. It aims to provide to VPN users Tor Browser's anti-fingerprinting browser technologies, which are key protections against [:material-eye-outline: Mass Surveillance](../../../wiki/basics/common-threats/index.md#mass-surveillance-programs){ .pg-blue }. It is developed by the Tor Project and distributed by [Mullvad](../../services/vpn/index.md#mullvad), and does **not** require the use of Mullvad's VPN.
**Mullvad Browser** is a version of [Tor Browser](../tor/index.md#tor-browser) with Tor network integrations removed. It aims to provide to VPN users Tor Browser's anti-fingerprinting browser technologies, which are key protections against [Mass Surveillance](../../../wiki/basics/common-threats/index.md#mass-surveillance-programs){ .pg-blue }. It is developed by the Tor Project and distributed by [Mullvad](../../services/vpn/index.md#mullvad), and does **not** require the use of Mullvad's VPN.
{{< cards >}}
{{< card link="https://mullvad.net/en/browser" title="Homepage" icon="home" >}}
@@ -69,10 +69,9 @@ This is required to prevent advanced forms of tracking, but does come at the cos
> [!WARNING]
> Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/).
### Recommended Firefox Configuration
These options can be found in :material-menu:**Settings**.
These options can be found in the menu → **Settings**.
#### Search
@@ -177,10 +176,9 @@ Brave is built upon the Chromium web browser project, so it should feel familiar
> [!WARNING]
> Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave%E2%80%99s-Use-of-Referral-Codes)" to the file name in downloads from the Brave website, which is used to track which source the browser was downloaded from, for example `BRV002` in a download named `Brave-Browser-BRV002.pkg`. The installer will then ping Brave's server with the referral code at the end of the installation process. If you're concerned about this, you can rename the installer file before opening it.
### Recommended Brave Configuration
These options can be found in :material-menu:**Settings**.
These options can be found in the menu → **Settings**.
#### Shields
@@ -17,7 +17,7 @@ Most online **document collaboration** platforms like Google Drive do not suppor
**CryptPad** is a private-by-design alternative to popular, full-fledged office suites. All content on this web service is E2EE and can be shared with other users easily.
[:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review)
[Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review)
{{< cards >}}
{{< card link="https://cryptpad.fr" title="Homepage" icon="home" >}}
@@ -53,19 +53,18 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo
> [!WARNING]
> When replying to someone on a mailing list in Thunderbird Mobile, the "reply" option may also include the mailing list. For more information see [thunderbird/thunderbird-android #3738](https://github.com/thunderbird/thunderbird-android/issues/3738).
#### Recommended Configuration
<div class="annotate" markdown>
We recommend changing some of these settings to make Thunderbird Desktop a little more private.
These options can be found in :material-menu:**Settings****Privacy & Security**.
These options can be found in the menu → **Settings****Privacy & Security**.
##### Web Content
- [ ] Uncheck **Remember websites and links I've visited**
- [ ] Uncheck **Accept cookies from sites** (1)
- [ ] Uncheck **Remember websites and links I've visited**
- [ ] Uncheck **Accept cookies from sites** (1)
</div>
@@ -73,7 +72,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
##### Telemetry
- [ ] Uncheck **Allow Thunderbird to send technical and interaction data to Mozilla**
- [ ] Uncheck **Allow Thunderbird to send technical and interaction data to Mozilla**
#### Thunderbird-user.js (advanced)
+1 -1
View File
@@ -29,7 +29,7 @@ The options listed here are available on multiple platforms and great for creati
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats/index.md#security-and-privacy)
**Cryptomator** is an encryption solution designed for privately saving files to any cloud [:material-server-network: Service Provider](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers){ .pg-teal }, eliminating the need to trust that they won't access your files. It allows you to create vaults that are stored on a virtual drive, the contents of which are encrypted and synced with your cloud storage provider.
**Cryptomator** is an encryption solution designed for privately saving files to any cloud [Service Provider](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers){ .pg-teal }, eliminating the need to trust that they won't access your files. It allows you to create vaults that are stored on a virtual drive, the contents of which are encrypted and synced with your cloud storage provider.
{{< cards >}}
{{< card link="https://cryptomator.org" title="Homepage" icon="home" >}}
+2 -2
View File
@@ -36,7 +36,7 @@ ffsend upload --host https://send.vis.ee/ FILE
### OnionShare
**OnionShare** is an open-source tool that lets you securely and [:material-incognito: anonymously](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple } share a file of any size. It works by starting a web server accessible as a Tor onion service, with an unguessable URL that you can share with the recipients to download or send files.
**OnionShare** is an open-source tool that lets you securely and [anonymously](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple } share a file of any size. It works by starting a web server accessible as a Tor onion service, with an unguessable URL that you can share with the recipients to download or send files.
{{< cards >}}
{{< card link="https://onionshare.org" title="Homepage" icon="home" >}}
@@ -48,7 +48,7 @@ ffsend upload --host https://send.vis.ee/ FILE
[{{< badge content="Windows" color="red" >}}](https://onionshare.org/#download)
[{{< badge content="Flathub" >}}](https://flathub.org/apps/org.onionshare.OnionShare)
OnionShare provides the option to connect via [Tor bridges](https://docs.onionshare.org/2.6.2/en/tor.html#automatic-censorship-circumvention) to circumvent [:material-close-outline: Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray }.
OnionShare provides the option to connect via [Tor bridges](https://docs.onionshare.org/2.6.2/en/tor.html#automatic-censorship-circumvention) to circumvent [Censorship](../../../wiki/basics/common-threats/index.md#avoiding-censorship){ .pg-blue-gray }.
### Criteria
+2 -2
View File
@@ -47,13 +47,13 @@ Please note that Organic Maps is a simple, basic app that lacks certain features
[{{< badge content="App Store" color="blue" >}}](https://apps.apple.com/us/app/id934850257)
[{{< badge content="Android" >}}](https://osmand.net/docs/versions/free-versions)
OsmAnd generates a [unique user identifier (UUID)](https://osmand.net/docs/legal/terms-of-use/#6-unique-user-indentifier) for each app install that rotates every three months and is used for internal reports and statistics. The UUID is also sent to OsmAnd's servers when downloading maps. On Android, there is a setting that controls whether the UUID is sent with each download request. From the home screen, go to :material-menu: :gear: **Settings** :gear: **OsmAnd settings** :material-web: **Identifiers**.
OsmAnd generates a [unique user identifier (UUID)](https://osmand.net/docs/legal/terms-of-use/#6-unique-user-indentifier) for each app install that rotates every three months and is used for internal reports and statistics. The UUID is also sent to OsmAnd's servers when downloading maps. On Android, there is a setting that controls whether the UUID is sent with each download request. From the home screen, go to the menu → **Settings****OsmAnd settings****Identifiers**.
- [ ] Uncheck **Send Unique User Identifier (UUID)**
This setting is not available on the iOS app.
The app also includes a setting for sharing anonymous data about your downloaded maps and the features you use. This setting is disabled by default on Android, but enabled by default on iOS. To disable it in the iOS app, tap the :material-menu: on the home screen to find the :gear: **Settings** menu. Select that, then select :gear: **OsmAnd settings**.
The app also includes a setting for sharing anonymous data about your downloaded maps and the features you use. This setting is disabled by default on Android, but enabled by default on iOS. To disable it in the iOS app, tap the menu on the home screen to find **Settings**. Select that, then select **OsmAnd settings**.
- [ ] Uncheck **Send anonymous data**
+12 -12
View File
@@ -11,7 +11,7 @@ description: These browsers are what we currently recommend for standard/non-ano
{{< card link="#cromite-android" title="Cromite" image="./cromite.svg" subtitle="Cromite is a Chromium-based browser with built-in ad blocking, fingerprinting protections, and other privacy and security enhancements. It is a fork of the discontinued Bromite browser." >}}
{{< card link="#safari-ios" title="Safari (iOS)" image="./safari.svg" subtitle="On iOS, any app that can browse the web is restricted to using an Apple-provided WebKit framework, so a browser like Brave does not use the Blink engine (the core component of Chromium) like its counterparts on other operating systems. Safari is the default browser in iOS." >}}
{{< /cards >}}
</div>
</div>
These are our currently recommended **mobile web browsers** and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](../tor/index.md) instead.
@@ -37,11 +37,11 @@ Tor Browser is the only way to truly browse the internet anonymously. When you u
=== "Android"
These options can be found in :material-menu:**Settings****Brave Shields & privacy**.
These options can be found in the menu → **Settings****Brave Shields & privacy**.
=== "iOS"
These options can be found in :fontawesome-solid-ellipsis:**Settings****Shields & Privacy**.
These options can be found in the menu**Settings****Shields & Privacy**.
#### Brave shields global defaults
@@ -132,19 +132,19 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
#### Leo
These options can be found in :material-menu:**Settings****Leo**.
These options can be found in the menu → **Settings****Leo**.
<div class="annotate" markdown>
<div class="annotate" markdown>
- [ ] Uncheck **Show autocomplete suggestions in address bar** (1)
</div>
</div>
1. This option is not present in Brave's iOS app.
#### Search engines
These options can be found in :material-menu:/:fontawesome-solid-ellipsis:**Settings****Search engines**.
These options can be found in the menu**Settings****Search engines**.
- [ ] Uncheck **Show search suggestions**
@@ -165,7 +165,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple.
### Recommended Safari Configuration
The following privacy/security-related options can be found in :gear: **Settings****Apps****Safari**.
The following privacy/security-related options can be found in **Settings****Apps****Safari**.
#### Allow Safari to Access
@@ -230,7 +230,7 @@ These settings ensure that websites can only access your camera, microphone, or
#### Other Privacy Settings
These options can be found in :gear: **Settings****Apps****Safari****Advanced**.
These options can be found in **Settings****Apps****Safari****Advanced**.
##### Fingerprinting Mitigations
@@ -248,7 +248,7 @@ The feature has little privacy concerns on its own, so while you can choose to l
#### Always-on Private Browsing
Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list.
Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list.
- [x] Select **Private**
@@ -260,11 +260,11 @@ Do note that Private Browsing does not save cookies and website data, so it won'
Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww).
You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings****iCloud****Advanced Data Protection**.
You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to **Settings****iCloud****Advanced Data Protection**.
- [x] Turn on **Advanced Data Protection**
If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings****Apps****Safari****General****Downloads**.
If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in **Settings****Apps****Safari****General****Downloads**.
## Criteria
+1 -1
View File
@@ -46,7 +46,7 @@ The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.ke
## KeePassium (iOS & macOS)
[:material-star-box: Read our latest KeePassium review.](https://www.privacyguides.org/articles/2025/05/13/keepassium-review)
[Read our latest KeePassium review.](https://www.privacyguides.org/articles/2025/05/13/keepassium-review)
KeePassium is a commercial, open-source password manager made by KeePassium Labs that's compatible with other KeePass applications. It provides autofill support, passkey management, automatic two-way synchronization through [most cloud storage providers](https://support.keepassium.com/kb/sync), and more.
@@ -45,7 +45,7 @@ If you are greatly concerned about an existing server censoring your content, th
## Mastodon
**Mastodon** is a social network based on open web protocols and free, open-source software. It uses the **:simple-activitypub: ActivityPub** protocol, which is decentralized like email: Users can exist on different servers or even different platforms but still communicate with each other.
**Mastodon** is a social network based on open web protocols and free, open-source software. It uses the **ActivityPub** protocol, which is decentralized like email: Users can exist on different servers or even different platforms but still communicate with each other.
{{< cards >}}
{{< card link="https://joinmastodon.org" title="Homepage" icon="home" >}}
@@ -113,7 +113,7 @@ If you used our recommended configuration settings above, you should be posting
## Element
**Element** is the flagship client for the **:simple-matrix: [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im)** protocol, an [open standard](https://spec.matrix.org/latest) that enables decentralized communication by way of federated chat rooms. Users can exist on different homeservers but still communicate with each other.
**Element** is the flagship client for the **[Matrix](https://matrix.org/docs/chat_basics/matrix-for-im)** protocol, an [open standard](https://spec.matrix.org/latest) that enables decentralized communication by way of federated chat rooms. Users can exist on different homeservers but still communicate with each other.
{{< cards >}}
{{< card link="https://element.io" title="Homepage" icon="home" >}}
@@ -134,7 +134,7 @@ To benefit the most from Matrix, it is critical to choose a homeserver which is
### Recommended Privacy Settings
From Element's web or desktop app, go to :gear:**All settings** to find these sections:
From Element's web or desktop app, go to Settings**All settings** to find these sections:
#### Sessions
+4 -5
View File
@@ -9,15 +9,14 @@ description: Protect your internet browsing from prying eyes by using the Tor ne
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
[Detailed Tor Overview :material-arrow-right-drop-circle:](../../../wiki/advanced/tor-overview/index.md)
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor)
[Detailed Tor Overview](../../../wiki/advanced/tor-overview/index.md)
[Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor)
{ .pg:buttons }
> [!TIP]
> Before connecting to Tor, please ensure you've read our [overview](../../../wiki/advanced/tor-overview/index.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](../../services/vpn/index.md), but you have to do so **properly** to avoid decreasing your anonymity.
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple } browsing for desktop computers and Android.
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [anonymous](../../../wiki/basics/common-threats/index.md#anonymity-vs-privacy){ .pg-purple } browsing for desktop computers and Android.
Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile.
@@ -54,7 +53,7 @@ In addition to installing Tor Browser on your computer directly, there are also
## Onion Browser (iOS)
[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review)
[Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review)
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser).
+8 -8
View File
@@ -254,7 +254,7 @@ We can simulate what a browser would do using the [`openssl`](https://en.wikiped
▸ requestList: 1 item
▸ Request
▸ reqCert
serialNumber
serialNumber
```
For the "Response" we can also see the "serial number":
@@ -295,7 +295,7 @@ graph TB
obnoxious --> | No | ispDNS{Does ISP support<br> encrypted DNS?}
ispDNS --> | Yes | useISP(Use<br> encrypted DNS<br> with ISP)
ispDNS --> | No | nothing(Do nothing)
```
```
Encrypted DNS with a third party should only be used to get around redirects and basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences, or you're interested in a provider that does some rudimentary filtering.
@@ -345,23 +345,23 @@ This feature does come at a privacy cost, as it tells the DNS server some inform
If you have `dig` installed you can test whether your DNS provider gives EDNS information out to DNS nameservers with the following command:
```bash
```bash
dig +nocmd -t txt o-o.myaddr.l.google.com +nocomments +noall +answer +stats
```
```
Note that this command will contact Google for the test, and return your IP as well as EDNS client subnet information. If you want to test another DNS resolver you can specify their IP, to test `9.9.9.11` for example:
```bash
```bash
dig +nocmd @9.9.9.11 -t txt o-o.myaddr.l.google.com +nocomments +noall +answer +stats
```
```
If the results include a second edns0-client-subnet TXT record (like shown below), then your DNS server is passing along EDNS information. The IP or network shown after is the precise information which was shared with Google by your DNS provider.
```text
```text
o-o.myaddr.l.google.com. 60 IN TXT "198.51.100.32"
o-o.myaddr.l.google.com. 60 IN TXT "edns0-client-subnet 198.51.100.0/24"
;; Query time: 64 msec
;; SERVER: 9.9.9.11#53(9.9.9.11)
;; WHEN: Wed Mar 13 10:23:08 CDT 2024
;; MSG SIZE rcvd: 130
```
```
+3 -3
View File
@@ -31,13 +31,13 @@ If you have [cryptocurrency](../../../tools/software/cryptocurrency/index.md), y
When buying gift cards online, there is usually a slight discount. Prepaid cards are usually sold online at face value or with a fee. If you buy prepaid cards and gift cards with cryptocurrencies, you should strongly prefer to pay with Monero which provides strong privacy (more on this below). Paying for a gift card with a traceable payment method negates the benefits a gift card can provide when purchased with cash or Monero.
- [Online Gift Card Marketplaces :material-arrow-right-drop-circle:](../../../tools/services/financial-services/index.md#gift-card-marketplaces)
- [Online Gift Card Marketplaces](../../../tools/services/financial-services/index.md#gift-card-marketplaces)
## Virtual Cards
Another way to protect your information from merchants online is to use virtual, single-use cards which mask your actual banking or billing information. This is primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft. They do **not** assist you in making a purchase completely anonymously, nor do they hide any information from the banking institution themselves. Regular financial institutions which offer virtual cards are subject to "Know Your Customer" (KYC) laws, meaning they may require your ID or other identifying information.
- [Recommended Payment Masking Services :material-arrow-right-drop-circle:](../../../tools/services/financial-services/index.md#payment-masking-services)
- [Recommended Payment Masking Services](../../../tools/services/financial-services/index.md#payment-masking-services)
These tend to be good options for recurring/subscription payments online, while prepaid gift cards are preferred for one-time transactions.
@@ -54,7 +54,7 @@ Cryptocurrencies are a digital form of currency designed to work without central
There are a number of cryptocurrency projects which purport to provide privacy by making transactions anonymous. We recommend using one which provides transaction anonymity **by default** to avoid operational errors.
- [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../../../tools/software/cryptocurrency/index.md#monero)
- [Recommended Cryptocurrency](../../../tools/software/cryptocurrency/index.md#monero)
Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can trace (at least to some extent) Bitcoin Lightning Network and/or Monero transactions. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million to further develop tools to do so. Due to the secrecy surrounding tools like these, <mark>none of these methods of tracing cryptocurrencies have been independently confirmed.</mark> However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins in their current form only succeed in thwarting mass surveillance.
+7 -7
View File
@@ -8,15 +8,15 @@ description: Tor is a free to use, decentralized network designed for using the
[**Tor**](../../../tools/advanced/alternative-networks/index.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor)
[Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor)
Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
[:octicons-home-16:](https://torproject.org)
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion)
[:octicons-info-16:](https://tb-manual.torproject.org)
[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor)
[:octicons-heart-16:](https://donate.torproject.org)
[Homepage](https://torproject.org)
[Onion Service](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion)
[Documentation](https://tb-manual.torproject.org)
[Source Code](https://gitlab.torproject.org/tpo/core/tor)
[Contribute](https://donate.torproject.org)
{ .pg:buttons }
## Safely Connecting to Tor
@@ -180,7 +180,7 @@ Though Tor does provide strong privacy guarantees, one must be aware that Tor is
If you wish to use Tor for browsing the web, we only recommend the **official** Tor Browser—it is designed to prevent fingerprinting.
- [Tor Browser :material-arrow-right-drop-circle:](../../../tools/software/tor/index.md#tor-browser)
- [Tor Browser](../../../tools/software/tor/index.md#tor-browser)
### Protections provided by bridges
@@ -8,7 +8,7 @@ description: Privacy isn't a straightforward topic, and it's easy to get caught
These myths stem from a number of prejudices, but whether the source code is available and how software is licensed does not inherently affect its security in any way. <mark>Open-source software has the *potential* to be more secure than proprietary software, but there is absolutely no guarantee this is the case.</mark> When you evaluate software, you should look at the reputation and security of each tool on an individual basis.
Open-source software *can* be audited by third-parties, and is often more transparent about potential vulnerabilities than proprietary counterparts. It also allows you to review the code and disable any suspicious functionality you find yourself. However, *unless you do so*, there is no guarantee that code has ever been evaluated, especially with smaller software projects. The open development process has also sometimes been exploited to introduce new vulnerabilities known as [:material-package-variant-closed-remove: Supply Chain Attacks](../common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian }, which are discussed further in our [Common Threats](../common-threats/index.md) page.[^1]
Open-source software *can* be audited by third-parties, and is often more transparent about potential vulnerabilities than proprietary counterparts. It also allows you to review the code and disable any suspicious functionality you find yourself. However, *unless you do so*, there is no guarantee that code has ever been evaluated, especially with smaller software projects. The open development process has also sometimes been exploited to introduce new vulnerabilities known as [Supply Chain Attacks](../common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian }, which are discussed further in our [Common Threats](../common-threats/index.md) page.[^1]
On the flip side, proprietary software is less transparent, but that doesn't imply that it's not secure. Major proprietary software projects can be audited internally and by third-party agencies, and independent security researchers can still find vulnerabilities with techniques like reverse engineering.
+30 -33
View File
@@ -6,47 +6,47 @@ description: Your threat model is personal to you, but these are some of the thi
Broadly speaking, we categorize our recommendations into the [threats](../threat-modeling/index.md) or goals that apply to most people. <mark>You may be concerned with none, one, a few, or all of these possibilities</mark>, and the tools and services you use depend on what your goals are. You may have specific threats outside these categories as well, which is perfectly fine! The important part is developing an understanding of the benefits and shortcomings of the tools you choose to use, because virtually none of them will protect you from every threat.
<span class="pg-purple">:material-incognito: **Anonymity**</span>
<span class="pg-purple">**Anonymity**</span>
: Shielding your online activity from your real identity, protecting you from people who are trying to uncover *your* identity specifically.
: Shielding your online activity from your real identity, protecting you from people who are trying to uncover *your* identity specifically.
<span class="pg-red">:material-target-account: **Targeted Attacks**</span>
<span class="pg-red">**Targeted Attacks**</span>
: Being protected from hackers or other malicious actors who are trying to gain access to *your* data or devices specifically.
: Being protected from hackers or other malicious actors who are trying to gain access to *your* data or devices specifically.
<span class="pg-viridian">:material-package-variant-closed-remove: **Supply Chain Attacks**</span>
<span class="pg-viridian">**Supply Chain Attacks**</span>
: Typically, a form of <span class="pg-red">:material-target-account: Targeted Attack</span> that centers around a vulnerability or exploit introduced into otherwise good software either directly or through a dependency from a third party.
: Typically, a form of <span class="pg-red">Targeted Attack</span> that centers around a vulnerability or exploit introduced into otherwise good software either directly or through a dependency from a third party.
<span class="pg-orange">:material-bug-outline: **Passive Attacks**</span>
<span class="pg-orange">**Passive Attacks**</span>
: Being protected from things like malware, data breaches, and other attacks that are made against many people at once.
: Being protected from things like malware, data breaches, and other attacks that are made against many people at once.
<span class="pg-teal">:material-server-network: **Service Providers**</span>
<span class="pg-teal">**Service Providers**</span>
: Protecting your data from service providers (e.g. with E2EE, which renders your data unreadable to the server).
: Protecting your data from service providers (e.g. with E2EE, which renders your data unreadable to the server).
<span class="pg-blue">:material-eye-outline: **Mass Surveillance**</span>
<span class="pg-blue">**Mass Surveillance**</span>
: Protection from government agencies, organizations, websites, and services which work together to track your activities.
: Protection from government agencies, organizations, websites, and services which work together to track your activities.
<span class="pg-brown">:material-account-cash: **Surveillance Capitalism**</span>
<span class="pg-brown">**Surveillance Capitalism**</span>
: Protecting yourself from big advertising networks, like Google and Facebook, as well as a myriad of other third-party data collectors.
: Protecting yourself from big advertising networks, like Google and Facebook, as well as a myriad of other third-party data collectors.
<span class="pg-green">:material-account-search: **Public Exposure**</span>
<span class="pg-green">**Public Exposure**</span>
: Limiting the information about you that is accessible online—to search engines or the public.
: Limiting the information about you that is accessible online—to search engines or the public.
<span class="pg-blue-gray">:material-close-outline: **Censorship**</span>
<span class="pg-blue-gray">**Censorship**</span>
: Avoiding censored access to information or being censored yourself when speaking online.
: Avoiding censored access to information or being censored yourself when speaking online.
Some of these threats may be more important to you than others, depending on your specific concerns. For example, a software developer with access to valuable or critical data may be primarily concerned with <span class="pg-viridian">:material-package-variant-closed-remove: Supply Chain Attacks</span> and <span class="pg-red">:material-target-account: Targeted Attacks</span>. They will likely still want to protect their personal data from being swept up in <span class="pg-blue">:material-eye-outline: Mass Surveillance</span> programs. Similarly, many people may be primarily concerned with <span class="pg-green">:material-account-search: Public Exposure</span> of their personal data, but they should still be wary of security-focused issues, such as <span class="pg-orange">:material-bug-outline: Passive Attacks</span>—like malware affecting their devices.
Some of these threats may be more important to you than others, depending on your specific concerns. For example, a software developer with access to valuable or critical data may be primarily concerned with <span class="pg-viridian">Supply Chain Attacks</span> and <span class="pg-red">Targeted Attacks</span>. They will likely still want to protect their personal data from being swept up in <span class="pg-blue">Mass Surveillance</span> programs. Similarly, many people may be primarily concerned with <span class="pg-green">Public Exposure</span> of their personal data, but they should still be wary of security-focused issues, such as <span class="pg-orange">Passive Attacks</span>—like malware affecting their devices.
## Anonymity vs. Privacy
<span class="pg-purple">:material-incognito: Anonymity</span>
<span class="pg-purple">Anonymity</span>
Anonymity is often confused with privacy, but they're distinct concepts. While privacy is a set of choices you make about how your data is used and shared, anonymity is the complete disassociation of your online activities from your real identity.
@@ -54,7 +54,7 @@ Whistleblowers and journalists, for example, can have a much more extreme threat
## Security and Privacy
<span class="pg-orange">:material-bug-outline: Passive Attacks</span>
<span class="pg-orange">Passive Attacks</span>
Security and privacy are also often confused, because you need security to obtain any semblance of privacy: Using tools—even if they're private by design—is futile if they could be easily exploited by attackers who later release your data. However, the inverse isn't necessarily true: The most secure service in the world *isn't necessarily* private. The best example of this is trusting data to Google who, given their scale, have had few security incidents by employing industry-leading security experts to secure their infrastructure. Even though Google provides very secure services, very few people would consider their data private in Google's free consumer products (Gmail, YouTube, etc.)
@@ -67,24 +67,22 @@ To minimize the damage that a malicious piece of software *could* do, you should
>
> Desktop operating systems generally lag behind on proper sandboxing. ChromeOS has similar sandboxing capabilities to Android, and macOS has full system permission control (and developers can opt in to sandboxing for applications). However, these operating systems do transmit identifying information to their respective OEMs. Linux tends to not submit information to system vendors, but it has poor protection against exploits and malicious apps. This can be mitigated somewhat with specialized distributions which make significant use of virtual machines or containers, such as [Qubes OS](../../../tools/os/desktop/index.md#qubes-os).
## Attacks against Specific Individuals
<span class="pg-red">:material-target-account: Targeted Attacks</span>
<span class="pg-red">Targeted Attacks</span>
Targeted attacks against a specific person are more problematic to deal with. Common attacks include sending malicious documents via email, exploiting vulnerabilities (e.g. in browsers and operating systems), and physical attacks. If this is a concern for you, you should employ more advanced threat mitigation strategies.
> [!TIP]
> By design, **web browsers**, **email clients**, and **office applications** typically run untrusted code, sent to you from third parties. Running multiple virtual machines—to separate applications like these from your host system, as well as each other—is one technique you can use to mitigate the chance of an exploit in these applications compromising the rest of your system. For example, technologies like Qubes OS or Microsoft Defender Application Guard on Windows provide convenient methods to do this.
If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user.
## Attacks against Certain Organizations
<span class="pg-viridian">:material-package-variant-closed-remove: Supply Chain Attacks</span>
<span class="pg-viridian">Supply Chain Attacks</span>
Supply chain attacks are frequently a form of <span class="pg-red">:material-target-account: Targeted Attack</span> towards businesses, governments, and activists, although they can end up compromising the public at large as well.
Supply chain attacks are frequently a form of <span class="pg-red">Targeted Attack</span> towards businesses, governments, and activists, although they can end up compromising the public at large as well.
> [!NOTE]
> A notable example of this occurred in 2017 when M.E.Doc, a popular accounting software in Ukraine, was infected with the *NotPetya* virus, subsequently infecting people who downloaded that software with ransomware. NotPetya itself was a ransomware attack which impacted 2000+ companies in various countries, and was based on the *EternalBlue* exploit developed by the NSA to attack Windows computers over the network.
@@ -105,7 +103,7 @@ These sorts of attacks can require a lot of time and preparation to perform and
## Privacy from Service Providers
<span class="pg-teal">:material-server-network: Service Providers</span>
<span class="pg-teal">Service Providers</span>
We live in a world where almost everything is connected to the internet. Our "private" messages, emails, and social interactions are typically stored on a server, somewhere. Generally, when you send someone a message it's stored on a server, and when your friend wants to read the message the server will show it to them.
@@ -124,7 +122,7 @@ Even with E2EE, service providers can still profile you based on **metadata**, w
## Mass Surveillance Programs
<span class="pg-blue">:material-eye-outline: Mass Surveillance</span>
<span class="pg-blue">Mass Surveillance</span>
Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative.
@@ -150,7 +148,7 @@ If you're concerned about mass surveillance programs, you can use strategies lik
## Surveillance as a Business Model
<span class="pg-brown">:material-account-cash: Surveillance Capitalism</span>
<span class="pg-brown">Surveillance Capitalism</span>
> Surveillance capitalism is an economic system centered around the capture and commodification of personal data for the core purpose of profit-making.[^3]
@@ -160,11 +158,11 @@ Additionally, even companies outside the *AdTech* or tracking industry can share
## Limiting Public Information
<span class="pg-green">:material-account-search: Public Exposure</span>
<span class="pg-green">Public Exposure</span>
The best way to keep your data private is simply not making it public in the first place. Deleting unwanted information you find about yourself online is one of the best first steps you can take to regain your privacy.
- [View our guide on account deletion :material-arrow-right-drop-circle:](../account-deletion/index.md)
- [View our guide on account deletion](../account-deletion/index.md)
On sites where you do share information, checking the privacy settings of your account to limit how widely that data is spread is very important. For example, enable "private mode" on your accounts if given the option: This ensures that your account isn't being indexed by search engines, and that it can't be viewed without your permission.
@@ -172,7 +170,7 @@ If you've already submitted your real information to sites which shouldn't have
## Avoiding Censorship
<span class="pg-blue-gray">:material-close-outline: Censorship</span>
<span class="pg-blue-gray">Censorship</span>
Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5]
@@ -185,7 +183,6 @@ People concerned with the threat of censorship can use technologies like [Tor](.
>
> You should consider which aspects of the network your adversary can observe, and whether you have plausible deniability for your actions. For example, using [encrypted DNS](../../advanced/dns-overview/index.md#what-is-encrypted-dns) can help you bypass rudimentary, DNS-based censorship systems, but it can't truly hide what you are visiting from your ISP. A VPN or Tor can help hide what you are visiting from network administrators, but can't hide that you're using those networks in the first place. Pluggable transports (such as Obfs4proxy, Meek, or Shadowsocks) can help you evade firewalls that block common VPN protocols or Tor, but your circumvention attempts can still be detected by methods like probing or [deep packet inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection).
You must always consider the risks of trying to bypass censorship, the potential consequences, and how sophisticated your adversary may be. You should be cautious with your software selection, and have a backup plan in case you are caught.
[^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance).
+2 -6
View File
@@ -40,7 +40,6 @@ Most computers and phones come equipped with a TPM (or a similar secure cryptopr
> [!NOTE]
> Virtual TPMs are susceptible to side-channel attacks and external TPMs, as a result of being separate from the CPU on the motherboard, are vulnerable to [sniffing](https://pulsesecurity.co.nz/articles/TPM-sniffing) when an attacker has access to the hardware. The solution to this problem is to include the secure processor inside the CPU itself, which is the case for Apple's chips and Microsoft's [Pluton](https://microsoft.com/en-us/security/blog/2020/11/17/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs).
### Biometrics
Many devices come equipped with a fingerprint reader or face recognition capabilities. These can be very convenient, but they aren't perfect and sometimes fail. Most devices will fall back to a PIN or password when this happens, meaning that the security of your devices is still only as good as your password.
@@ -52,7 +51,6 @@ Most implementations of face authentication require you to be looking at your ph
> [!WARNING]
> Some devices do not have the proper hardware for secure face authentication. There are two main types of face authentication: 2D and 3D. 3D face authentication makes use of a dot projector that lets the device create a 3D depth map of your face. Make sure that your device has this capability.
Android defines three [security classes](https://source.android.com/docs/security/features/biometric/measure#biometric-classes) for biometrics; you should check that your device is Class 3 before enabling biometrics.
### Device Encryption
@@ -69,8 +67,8 @@ Some threats can't be protected against by your internal components alone. Many
Hardware keys are devices that use strong cryptography to authenticate you to a device or account. The idea is that because they can not be copied, you can use them to secure accounts in such a way that they can only be accessed with physical possession of the key, eliminating many remote attacks.
[Recommended Hardware Keys :material-arrow-right-drop-circle:](../../../tools/hardware/security-keys/index.md)
[Learn More about Hardware Keys :material-arrow-right-drop-circle:](../multi-factor-authentication/index.md#hardware-security-keys)
[Recommended Hardware Keys](../../../tools/hardware/security-keys/index.md)
[Learn More about Hardware Keys](../multi-factor-authentication/index.md#hardware-security-keys)
{ .pg:buttons }
### Camera/Microphone
@@ -80,7 +78,6 @@ If you don't want to trust your OS's permission controls to prevent the camera f
> [!WARNING]
> You should only buy covers that fit your laptop and won't cause damage when you close the lid. Covering the camera will interfere with automatic brightness and face authentication features.
For microphone access, in most cases you will need to trust your OS's built-in permission controls. Alternatively, buy a device that doesn't have a built-in microphone and use an external microphone that you can unplug when you're done using it. Some devices, like a [MacBook or an iPad](https://support.apple.com/guide/security/hardware-microphone-disconnect-secbbd20b00b/web), feature a hardware disconnect for the microphone when you close the lid.
Many computers have a BIOS option to disable the camera and microphone. When disabled there, the hardware won't even appear as a device on a booted system.
@@ -132,7 +129,6 @@ Your router handles all your network traffic and acts as your first line of defe
> [!NOTE]
> A lot of routers come with storage to put your files on so you can access them from any computer on your network. We recommend you don't use networking devices for things other than networking. In the event your router was compromised, your files would also be compromised.
The most important thing to think about with routers is keeping them up-to-date. Many modern routers will automatically install updates, but many others won't. You should check on your router's settings page for this option. That page can usually be accessed by typing `192.168.1.1` or `192.168.0.1` into the URL bar of any browser assuming you're on the same network. You can also check in the network settings of your OS for "router" or "gateway".
If your router does not support automatic updates, you will need to go to the manufacturer's site to download the updates and apply them manually.
@@ -78,7 +78,7 @@ One metric to determine the strength of a diceware passphrase is how much entrop
<mn>2</mn>
</msub>
<mo form="prefix" stretchy="false">(</mo>
<mtext>WordsInList</mtext>
<mtext>WordsInList</mtext>
<mo form="postfix" stretchy="false">)</mo>
</mrow>
</math> and the overall entropy of the passphrase is calculated as: <math>
@@ -103,7 +103,7 @@ Therefore, each word in the aforementioned list results in ~12.9 bits of entropy
<mn>2</mn>
</msub>
<mo form="prefix" stretchy="false">(</mo>
<mn>7776</mn>
<mn>7776</mn>
<mo form="postfix" stretchy="false">)</mo>
</mrow>
</math>), and a seven word passphrase derived from it has ~90.47 bits of entropy (<math>
@@ -122,10 +122,10 @@ Therefore, each word in the aforementioned list results in ~12.9 bits of entropy
</math>).
The [EFF's large word list](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is <math>
<msup>
<mtext>WordsInList</mtext>
<mtext>WordsInPhrase</mtext>
</msup>
<msup>
<mtext>WordsInList</mtext>
<mtext>WordsInPhrase</mtext>
</msup>
</math>, or in our case, <math><msup><mn>7776</mn><mn>7</mn></msup></math>.
Let's put all of this in perspective: A seven word passphrase using [EFF's large word list](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases.
+6 -6
View File
@@ -73,23 +73,23 @@ These questions can apply to a wide variety of situations, online and offline. A
**What do you want to protect? (Or, *what do you have that is worth protecting?*)**
: Your assets might include jewelry, electronics, important documents, or photos.
: Your assets might include jewelry, electronics, important documents, or photos.
**Who do you want to protect it from?**
: Your adversaries might include burglars, roommates, or guests.
: Your adversaries might include burglars, roommates, or guests.
**How likely is it that you will need to protect it?**
: Does your neighborhood have a history of burglaries? How trustworthy are your roommates or guests? What are the capabilities of your adversaries? What are the risks you should consider?
: Does your neighborhood have a history of burglaries? How trustworthy are your roommates or guests? What are the capabilities of your adversaries? What are the risks you should consider?
**How bad are the consequences if you fail?**
: Do you have anything in your house that you cannot replace? Do you have the time or money to replace those things? Do you have insurance that covers goods stolen from your home?
: Do you have anything in your house that you cannot replace? Do you have the time or money to replace those things? Do you have insurance that covers goods stolen from your home?
**How much trouble are you willing to go through to prevent these consequences?**
: Are you willing to buy a safe for sensitive documents? Can you afford to buy a high-quality lock? Do you have time to open a security box at your local bank and keep your valuables there?
: Are you willing to buy a safe for sensitive documents? Can you afford to buy a high-quality lock? Do you have time to open a security box at your local bank and keep your valuables there?
Only once you have asked yourself these questions will you be in a position to assess what measures to take. If your possessions are valuable, but the probability of a break-in is low, then you may not want to invest too much money in a lock. But, if the probability of a break-in is high, you'll want to get the best lock on the market and consider adding a security system.
@@ -99,7 +99,7 @@ Making a security plan will help you to understand the threats that are unique t
For people looking to increase their privacy and security online, we've compiled a list of common threats our visitors face or goals our visitors have, to give you some inspiration and demonstrate the basis of our recommendations.
- [Common Goals and Threats :material-arrow-right-drop-circle:](../common-threats/index.md)
- [Common Goals and Threats](../common-threats/index.md)
## Sources
+1 -2
View File
@@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn)
[Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn)
{ .pg:buttons }
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../../advanced/dns-overview/index.md#why-shouldnt-i-use-encrypted-dns).
@@ -17,7 +17,6 @@ Using a VPN hides even this information from your ISP, by shifting the trust you
> [!NOTE]
> When we refer to "Virtual Private Networks" on this website, we are usually referring to **commercial** [VPN providers](../../../tools/services/vpn/index.md), who you pay a monthly fee to in exchange for routing your internet traffic securely through their public servers. There are many other forms of VPN, such as ones you host yourself or ones operated by workplaces which allow you to securely connect to internal/employee network resources, however, these VPNs are usually designed for accessing remote networks securely, rather than protecting the privacy of your internet connection.
## How does a VPN work?
VPNs encrypt your traffic between your device and a server owned by your VPN provider. From the perspective of anyone between you and the VPN server, it looks like you're connecting to the VPN server. From the perspective of anyone between the VPN server and your destination site, all they can see is the VPN server connecting to the website.
@@ -14,25 +14,25 @@ Many people get the concepts of **privacy**, **security**, and **anonymity** con
<!-- markdownlint-disable-next-line -->
**Privacy**
: <mark>Privacy is the assurance that your data is only seen by the parties you intend to view it.</mark> In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient.
: <mark>Privacy is the assurance that your data is only seen by the parties you intend to view it.</mark> In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient.
<!-- markdownlint-disable-next-line -->
**Security**
: Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
: Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
: Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
: Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
<!-- markdownlint-disable-next-line -->
**Anonymity**
: Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../../../tools/software/tor/index.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
: Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../../../tools/software/tor/index.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
: **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
: **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../../../tools/_index.md) you use.
[:material-book-outline: Learn More About Threat Modeling](../threat-modeling/index.md)
[Learn More About Threat Modeling](../threat-modeling/index.md)
{ .pg:buttons }
## Privacy vs. Secrecy
@@ -51,7 +51,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times
Privacy is something we need to have baked into the [software and services](../../../tools/_index.md) we use by default, you can't bend most apps into being private on your own.
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" }
[Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online)
{ .pg:buttons }
## Sources
+10 -12
View File
@@ -9,12 +9,12 @@ robots: nofollow, max-snippet:-1, max-image-preview:large
The **Android Open Source Project** is a secure mobile operating system featuring strong [app sandboxing](https://source.android.com/security/app-sandbox), [Verified Boot](https://source.android.com/security/verifiedboot) (AVB), and a robust [permission](https://developer.android.com/guide/topics/permissions/overview) control system.
[:octicons-home-16:](https://source.android.com)
[:octicons-info-16:](https://source.android.com/docs)
[:octicons-code-16:](https://cs.android.com/android/platform/superproject/main)
[Homepage](https://source.android.com)
[Documentation](https://source.android.com/docs)
[Source Code](https://cs.android.com/android/platform/superproject/main)
{ .pg:buttons }
[Our Android Advice :material-arrow-right-drop-circle:](../../../tools/os/android/_index.md)
[Our Android Advice](../../../tools/os/android/_index.md)
{ .pg:buttons }
## Security Protections
@@ -79,16 +79,14 @@ An app may request a permission for a specific feature it has. For example, any
> [!WARNING]
> If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.
> [!NOTE]
> Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all the analytics features that are provided by Google Firebase Analytics.
## Privacy Features
### User Profiles
Multiple **user profiles** can be found in :gear: **Settings****System****Users** and are the simplest way to isolate in Android.
Multiple **user profiles** can be found in **Settings****System****Users** and are the simplest way to isolate in Android.
With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation.
@@ -104,7 +102,7 @@ This method is generally less secure than a secondary user profile; however, it
### Private Space
**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings****Security & privacy****Private space**. Once set up, your private space resides at the bottom of the app drawer.
**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to **Settings****Security & privacy****Private space**. Once set up, your private space resides at the bottom of the app drawer.
Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield.
@@ -112,7 +110,7 @@ Unlike work profiles, Private Space is a feature native to Android that does not
### VPN kill switch
Android 7 and above supports a VPN kill switch, and it is available without the need to install third-party apps. This feature can prevent leaks if the VPN is disconnected. It can be found in :gear: **Settings****Network & internet****VPN**:gear:**Block connections without VPN**.
Android 7 and above supports a VPN kill switch, and it is available without the need to install third-party apps. This feature can prevent leaks if the VPN is disconnected. It can be found in **Settings****Network & internet****VPN**Settings**Block connections without VPN**.
### Global Toggles
@@ -151,14 +149,14 @@ If you have an EOL device shipped with Android 10 or above and are unable to run
All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you.
On Android distributions with [sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings****Apps****Sandboxed Google Play****Google Settings****All services****Ads**.
On Android distributions with [sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to **Settings****Apps****Sandboxed Google Play****Google Settings****All services****Ads**.
- [x] Select **Delete advertising ID**
On Android distributions with privileged Google Play Services (which includes the stock installation on most devices), the setting may be in one of several locations. Check
- :gear: **Settings****Google** → **Ads**
- :gear: **Settings****Privacy** → **Ads**
- **Settings****Google** → **Ads**
- **Settings****Privacy** → **Ads**
You will either be given the option to delete your advertising ID or to *Opt out of interest-based ads* (this varies between OEM distributions of Android). If presented with the option to delete the advertising ID, that is preferred. If not, then make sure to opt out and reset your advertising ID.
+5 -7
View File
@@ -80,7 +80,7 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil
#### Wi-Fi
You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button:
You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the info button:
- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating**
@@ -126,7 +126,7 @@ Apple Intelligence can integrate with [ChatGPT](https://support.apple.com/guide/
You can also have it ask for confirmation every time if you leave ChatGPT integration on:
- [x] Turn on **Confirm Requests**
- [x] Turn on **Confirm Requests**
If you don't want anyone to be able to control your phone with Siri when it is locked, you can turn that off here.
@@ -157,7 +157,6 @@ iPhones are already resistant to brute-force attacks by making you wait long per
> [!WARNING]
> With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it.
- [x] Turn on **Erase Data**
#### Privacy & Security
@@ -255,7 +254,6 @@ Sometimes you might want to hand your phone to someone to make a call or do a sp
> [!WARNING]
> Guided Access isn't foolproof, as it's possible you could leak data unintentionally or the feature could be bypassed. You should only use Guided Access for situations where you casually hand your phone to someone to use. You should not use it as a tool to protect against advanced adversaries.
### Redacting Elements in Images
If you need to hide information in a photo, you can use Apple's built-in editing tools to do so.
@@ -263,7 +261,7 @@ If you need to hide information in a photo, you can use Apple's built-in editing
You can use the [Clean Up](https://support.apple.com/en-us/121429) feature on supported devices to pixelate faces or remove objects from images.
- Open the **Photos** app and tap the photo you have selected for redaction
- Tap the :material-tune:
- Tap **Adjust**
- Tap the button labeled **Clean Up**
- Draw a circle around whatever you want to redact. Faces will be pixelated, and it will attempt to delete anything else.
@@ -272,7 +270,7 @@ Our warning [against blurring text](../../../tools/software/data-redaction/index
<div class="annotate" markdown>
- Tap the image you have selected for redaction
- Tap the :material-tune: → :material-dots-horizontal: (1) → Markup → :material-plus:
- Tap **Adjust****More** () → Markup → **Add**
- Select **Add Shape** and choose the square or circle
- On the toolbar, tap the circle and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit.
@@ -294,7 +292,7 @@ Apple always makes beta versions of iOS available early for those that wish to h
### Before First Unlock
If your threat model includes [:material-target-account: Targeted Attacks](../../basics/common-threats/index.md#attacks-against-specific-individuals){ .pg-red } that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation.
If your threat model includes [Targeted Attacks](../../basics/common-threats/index.md#attacks-against-specific-individuals){ .pg-red } that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation.
iPhones [automatically reboot](https://support.apple.com/guide/security/protecting-user-data-in-the-face-of-attack-secf5549a4f5/1/web/1#:~:text=On%20an%20iPhone%20or%20iPad%20with%20iOS%2018%20and%20iPadOS%2018%20or%20later%2C%20a%20new%20security%20protection%20will%20restart%20devices%20if%20they%20remain%20locked%20for%20a%20prolonged%20period%20of%20time.) if they're not unlocked after a period of time.
+3 -3
View File
@@ -7,7 +7,7 @@ description: Linux is an open-source, privacy-focused desktop operating system a
Our website generally uses the term “Linux” to describe **desktop** Linux distributions. Other operating systems which also use the Linux kernel such as ChromeOS, Android, and Qubes OS are not discussed on this page.
[Our Linux Recommendations :material-arrow-right-drop-circle:](../../../tools/os/desktop/index.md)
[Our Linux Recommendations](../../../tools/os/desktop/index.md)
{ .pg:buttons }
## Security Notes
@@ -68,7 +68,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re
For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](#mandatory-access-control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit).
Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software [:material-package-variant-closed-remove: Supply Chain Attacks](../../basics/common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian }, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository).
Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software [Supply Chain Attacks](../../basics/common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian }, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository).
The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to the use of third-party Personal Package Archives (PPAs) on Debian-based distributions or Community Projects (COPR) on Fedora.
@@ -95,7 +95,7 @@ SELinux on [Fedora](https://docs.fedoraproject.org/en-US/quick-docs/selinux-gett
Most Linux distributions have an option within its installer for enabling [LUKS](../../../tools/software/encryption/index.md#linux-unified-key-setup) FDE. If this option isnt set at installation time, you will have to back up your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device:
- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure)
- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure)
### Swap
+3 -7
View File
@@ -79,7 +79,7 @@ Click on **About** and type your desired device name into the **Name** field.
You should automatically install all available updates to make sure your Mac has the latest security fixes.
Click the small :material-information-outline: icon next to **Automatic Updates**:
Click the small icon next to **Automatic Updates**:
- [x] Turn on **Download new updates when available**
@@ -109,7 +109,6 @@ You can also have it ask for confirmation every time if you leave ChatGPT integr
> [!WARNING]
> Any request made with ChatGPT will be sent to ChatGPT's servers, there is no on-device processing and no PCC like with Apple Intelligence.
#### Privacy & Security
Whenever an application requests a permission, it will show up here. You can decide which applications you want to allow or deny specific permissions.
@@ -163,7 +162,6 @@ macOS employs defense in depth by relying on multiple layers of software and har
> [!WARNING]
> macOS allows you to install beta updates. These are unstable and may come with [extra telemetry](https://beta.apple.com/privacy) since they're for testing purposes. Because of this, we recommend you avoid beta software in general.
#### Signed System Volume
macOS's system components are protected in a read-only [signed system volume](https://support.apple.com/guide/security/signed-system-volume-security-secd698747c9/web), meaning that neither you nor malware can alter important system files.
@@ -180,11 +178,10 @@ System Integrity Protection makes critical file locations read-only to protect a
##### App Sandbox
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The [App Sandbox](https://developer.apple.com/documentation/xcode/configuring-the-macos-app-sandbox) protects against vulnerabilities in the apps you run by limiting what a malicious actor can access in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../../basics/common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian } by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the [App Store](https://support.apple.com/guide/security/gatekeeper-and-runtime-protection-sec5599b66df/1/web/1#:~:text=All%20apps%20from%20the%20App%20Store%20are%20sandboxed%20to%20restrict%20access%20to%20data%20stored%20by%20other%20apps.).
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The [App Sandbox](https://developer.apple.com/documentation/xcode/configuring-the-macos-app-sandbox) protects against vulnerabilities in the apps you run by limiting what a malicious actor can access in the event that the app is exploited. The App Sandbox *alone* can't protect against [Supply Chain Attacks](../../basics/common-threats/index.md#attacks-against-certain-organizations){ .pg-viridian } by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the [App Store](https://support.apple.com/guide/security/gatekeeper-and-runtime-protection-sec5599b66df/1/web/1#:~:text=All%20apps%20from%20the%20App%20Store%20are%20sandboxed%20to%20restrict%20access%20to%20data%20stored%20by%20other%20apps.).
> [!WARNING]
> Software downloaded from outside the official App Store is not required to be sandboxed. If your threat model prioritizes defending against [:material-bug-outline: Passive Attacks](../../basics/common-threats/index.md#security-and-privacy){ .pg-orange }, then you may want to check if the software you download outside the App Store is sandboxed, which is up to the developer to *opt in*.
> Software downloaded from outside the official App Store is not required to be sandboxed. If your threat model prioritizes defending against [Passive Attacks](../../basics/common-threats/index.md#security-and-privacy){ .pg-orange }, then you may want to check if the software you download outside the App Store is sandboxed, which is up to the developer to *opt in*.
You can check if an app uses the App Sandbox in a few ways:
@@ -193,7 +190,6 @@ You can check if apps that are already running are sandboxed using the [Activity
> [!WARNING]
> Just because one of an app's processes is sandboxed doesn't mean they all are.
Alternatively, you can check apps before you run them by running this command in the terminal:
``` zsh