1
1
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2026-05-19 18:01:22 +00:00

feat: Redirect old permalinks to new ones

This commit is contained in:
2026-05-19 12:20:31 -05:00
parent 900d761e58
commit 267a8a47e5
112 changed files with 418 additions and 1 deletions
+127
View File
@@ -1,124 +1,251 @@
# Redirects from legacy MkDocs /en/ URLs to the Hugo site structure.
# Generated by scripts/generate_redirects.py — re-run after sitemap or content changes.
/en/ https://en.privacyguides.org/ 301
/ https://en.privacyguides.org/ 301
/en/CODE_OF_CONDUCT/ https://github.com/privacyguides/privacyguides.org/blob/main/.github/CODE_OF_CONDUCT.md 301
/CODE_OF_CONDUCT/ https://github.com/privacyguides/privacyguides.org/blob/main/.github/CODE_OF_CONDUCT.md 301
/en/about/ https://en.privacyguides.org/about/ 301
/about/ https://en.privacyguides.org/about/ 301
/en/about/contributors/ https://en.privacyguides.org/about/ 301
/about/contributors/ https://en.privacyguides.org/about/ 301
/en/about/criteria/ https://en.privacyguides.org/about/criteria/ 301
/about/criteria/ https://en.privacyguides.org/about/criteria/ 301
/en/about/donate/ https://en.privacyguides.org/about/donate/ 301
/about/donate/ https://en.privacyguides.org/about/donate/ 301
/en/about/donation-acceptance-policy/ https://en.privacyguides.org/about/donation-acceptance-policy/ 301
/about/donation-acceptance-policy/ https://en.privacyguides.org/about/donation-acceptance-policy/ 301
/en/about/executive-policy/ https://en.privacyguides.org/about/executive-policy/ 301
/about/executive-policy/ https://en.privacyguides.org/about/executive-policy/ 301
/en/about/jobs/ https://en.privacyguides.org/about/jobs/ 301
/about/jobs/ https://en.privacyguides.org/about/jobs/ 301
/en/about/jobs/content-creator/ https://en.privacyguides.org/about/jobs/ 301
/about/jobs/content-creator/ https://en.privacyguides.org/about/jobs/ 301
/en/about/jobs/intern-news/ https://en.privacyguides.org/about/jobs/ 301
/about/jobs/intern-news/ https://en.privacyguides.org/about/jobs/ 301
/en/about/jobs/journalist/ https://en.privacyguides.org/about/jobs/ 301
/about/jobs/journalist/ https://en.privacyguides.org/about/jobs/ 301
/en/about/notices/ https://en.privacyguides.org/about/notices/ 301
/about/notices/ https://en.privacyguides.org/about/notices/ 301
/en/about/privacytools/ https://en.privacyguides.org/about/privacytools/ 301
/about/privacytools/ https://en.privacyguides.org/about/privacytools/ 301
/en/about/services/ https://en.privacyguides.org/about/services/ 301
/about/services/ https://en.privacyguides.org/about/services/ 301
/en/about/statistics/ https://en.privacyguides.org/about/statistics/ 301
/about/statistics/ https://en.privacyguides.org/about/statistics/ 301
/en/activism/ https://en.privacyguides.org/activism/ 301
/activism/ https://en.privacyguides.org/activism/ 301
/en/activism/legal/dpa-directory/ https://en.privacyguides.org/activism/legal/dpa-directory/ 301
/activism/legal/dpa-directory/ https://en.privacyguides.org/activism/legal/dpa-directory/ 301
/en/activism/toolbox/ https://en.privacyguides.org/activism/toolbox/ 301
/activism/toolbox/ https://en.privacyguides.org/activism/toolbox/ 301
/en/activism/toolbox/tip-be-kind-to-people-but-be-relentless-with-institutions/ https://en.privacyguides.org/activism/toolbox/tip-be-kind-to-people-but-be-relentless-with-institutions/ 301
/activism/toolbox/tip-be-kind-to-people-but-be-relentless-with-institutions/ https://en.privacyguides.org/activism/toolbox/tip-be-kind-to-people-but-be-relentless-with-institutions/ 301
/en/activism/toolbox/tip-be-mindful-of-accessibility/ https://en.privacyguides.org/activism/toolbox/tip-be-mindful-of-accessibility/ 301
/activism/toolbox/tip-be-mindful-of-accessibility/ https://en.privacyguides.org/activism/toolbox/tip-be-mindful-of-accessibility/ 301
/en/activism/toolbox/tip-beware-of-privacy-snake-oil/ https://en.privacyguides.org/activism/toolbox/tip-beware-of-privacy-snake-oil/ 301
/activism/toolbox/tip-beware-of-privacy-snake-oil/ https://en.privacyguides.org/activism/toolbox/tip-beware-of-privacy-snake-oil/ 301
/en/activism/toolbox/tip-consider-everyones-unique-situation/ https://en.privacyguides.org/activism/toolbox/tip-consider-everyones-unique-situation/ 301
/activism/toolbox/tip-consider-everyones-unique-situation/ https://en.privacyguides.org/activism/toolbox/tip-consider-everyones-unique-situation/ 301
/en/activism/toolbox/tip-dont-stop-at-individual-solutions/ https://en.privacyguides.org/activism/toolbox/tip-dont-stop-at-individual-solutions/ 301
/activism/toolbox/tip-dont-stop-at-individual-solutions/ https://en.privacyguides.org/activism/toolbox/tip-dont-stop-at-individual-solutions/ 301
/en/activism/toolbox/tip-engage-boosts-and-contribute/ https://en.privacyguides.org/activism/toolbox/tip-engage-boosts-and-contribute/ 301
/activism/toolbox/tip-engage-boosts-and-contribute/ https://en.privacyguides.org/activism/toolbox/tip-engage-boosts-and-contribute/ 301
/en/activism/toolbox/tip-give-credit-where-credit-is-due/ https://en.privacyguides.org/activism/toolbox/tip-give-credit-where-credit-is-due/ 301
/activism/toolbox/tip-give-credit-where-credit-is-due/ https://en.privacyguides.org/activism/toolbox/tip-give-credit-where-credit-is-due/ 301
/en/activism/toolbox/tip-improve-your-social-media-and-build-resilient-communities/ https://en.privacyguides.org/activism/toolbox/tip-improve-your-social-media-and-build-resilient-communities/ 301
/activism/toolbox/tip-improve-your-social-media-and-build-resilient-communities/ https://en.privacyguides.org/activism/toolbox/tip-improve-your-social-media-and-build-resilient-communities/ 301
/en/activism/toolbox/tip-keep-in-mind-the-whole-landscape/ https://en.privacyguides.org/activism/toolbox/tip-keep-in-mind-the-whole-landscape/ 301
/activism/toolbox/tip-keep-in-mind-the-whole-landscape/ https://en.privacyguides.org/activism/toolbox/tip-keep-in-mind-the-whole-landscape/ 301
/en/activism/toolbox/tip-keep-your-posts-and-community-inclusive/ https://en.privacyguides.org/activism/toolbox/tip-keep-your-posts-and-community-inclusive/ 301
/activism/toolbox/tip-keep-your-posts-and-community-inclusive/ https://en.privacyguides.org/activism/toolbox/tip-keep-your-posts-and-community-inclusive/ 301
/en/activism/toolbox/tip-know-your-privacy-laws/ https://en.privacyguides.org/activism/toolbox/tip-know-your-privacy-laws/ 301
/activism/toolbox/tip-know-your-privacy-laws/ https://en.privacyguides.org/activism/toolbox/tip-know-your-privacy-laws/ 301
/en/activism/toolbox/tip-level-up-assemble-and-organize/ https://en.privacyguides.org/activism/toolbox/tip-level-up-assemble-and-organize/ 301
/activism/toolbox/tip-level-up-assemble-and-organize/ https://en.privacyguides.org/activism/toolbox/tip-level-up-assemble-and-organize/ 301
/en/activism/toolbox/tip-lift-your-allies-up/ https://en.privacyguides.org/activism/toolbox/tip-lift-your-allies-up/ 301
/activism/toolbox/tip-lift-your-allies-up/ https://en.privacyguides.org/activism/toolbox/tip-lift-your-allies-up/ 301
/en/activism/toolbox/tip-make-it-cute/ https://en.privacyguides.org/activism/toolbox/tip-make-it-cute/ 301
/activism/toolbox/tip-make-it-cute/ https://en.privacyguides.org/activism/toolbox/tip-make-it-cute/ 301
/en/activism/toolbox/tip-migrate-outside-the-surveillance-ecosystem/ https://en.privacyguides.org/activism/toolbox/tip-migrate-outside-the-surveillance-ecosystem/ 301
/activism/toolbox/tip-migrate-outside-the-surveillance-ecosystem/ https://en.privacyguides.org/activism/toolbox/tip-migrate-outside-the-surveillance-ecosystem/ 301
/en/activism/toolbox/tip-protect-your-allies/ https://en.privacyguides.org/activism/toolbox/tip-protect-your-allies/ 301
/activism/toolbox/tip-protect-your-allies/ https://en.privacyguides.org/activism/toolbox/tip-protect-your-allies/ 301
/en/activism/toolbox/tip-refuse-to-participate/ https://en.privacyguides.org/activism/toolbox/tip-refuse-to-participate/ 301
/activism/toolbox/tip-refuse-to-participate/ https://en.privacyguides.org/activism/toolbox/tip-refuse-to-participate/ 301
/en/activism/toolbox/tip-report-privacy-violations/ https://en.privacyguides.org/activism/toolbox/tip-report-privacy-violations/ 301
/activism/toolbox/tip-report-privacy-violations/ https://en.privacyguides.org/activism/toolbox/tip-report-privacy-violations/ 301
/en/activism/toolbox/tip-small-actions-matter/ https://en.privacyguides.org/activism/toolbox/tip-small-actions-matter/ 301
/activism/toolbox/tip-small-actions-matter/ https://en.privacyguides.org/activism/toolbox/tip-small-actions-matter/ 301
/en/activism/toolbox/tip-start-alliances-not-wars/ https://en.privacyguides.org/activism/toolbox/tip-start-alliances-not-wars/ 301
/activism/toolbox/tip-start-alliances-not-wars/ https://en.privacyguides.org/activism/toolbox/tip-start-alliances-not-wars/ 301
/en/activism/toolbox/tip-stay-true-to-your-principles/ https://en.privacyguides.org/activism/toolbox/tip-stay-true-to-your-principles/ 301
/activism/toolbox/tip-stay-true-to-your-principles/ https://en.privacyguides.org/activism/toolbox/tip-stay-true-to-your-principles/ 301
/en/activism/toolbox/tip-support-your-privacy-comrades/ https://en.privacyguides.org/activism/toolbox/tip-support-your-privacy-comrades/ 301
/activism/toolbox/tip-support-your-privacy-comrades/ https://en.privacyguides.org/activism/toolbox/tip-support-your-privacy-comrades/ 301
/en/activism/toolbox/tip-take-time-to-rest/ https://en.privacyguides.org/activism/toolbox/tip-take-time-to-rest/ 301
/activism/toolbox/tip-take-time-to-rest/ https://en.privacyguides.org/activism/toolbox/tip-take-time-to-rest/ 301
/en/activism/toolbox/tip-value-allies-with-complementary-expertise/ https://en.privacyguides.org/activism/toolbox/tip-value-allies-with-complementary-expertise/ 301
/activism/toolbox/tip-value-allies-with-complementary-expertise/ https://en.privacyguides.org/activism/toolbox/tip-value-allies-with-complementary-expertise/ 301
/en/activism/toolbox/tip-welcome-beginners/ https://en.privacyguides.org/activism/toolbox/tip-welcome-beginners/ 301
/activism/toolbox/tip-welcome-beginners/ https://en.privacyguides.org/activism/toolbox/tip-welcome-beginners/ 301
/en/advanced/communication-network-types/ https://en.privacyguides.org/wiki/advanced/communication-networks/ 301
/advanced/communication-network-types/ https://en.privacyguides.org/wiki/advanced/communication-networks/ 301
/en/advanced/dns-overview/ https://en.privacyguides.org/wiki/advanced/dns-overview/ 301
/advanced/dns-overview/ https://en.privacyguides.org/wiki/advanced/dns-overview/ 301
/en/advanced/payments/ https://en.privacyguides.org/wiki/advanced/payments/ 301
/advanced/payments/ https://en.privacyguides.org/wiki/advanced/payments/ 301
/en/advanced/tor-overview/ https://en.privacyguides.org/wiki/advanced/tor-overview/ 301
/advanced/tor-overview/ https://en.privacyguides.org/wiki/advanced/tor-overview/ 301
/en/ai-chat/ https://en.privacyguides.org/tools/software/ai-chat/ 301
/ai-chat/ https://en.privacyguides.org/tools/software/ai-chat/ 301
/en/alternative-networks/ https://en.privacyguides.org/tools/advanced/alternative-networks/ 301
/alternative-networks/ https://en.privacyguides.org/tools/advanced/alternative-networks/ 301
/en/android/ https://en.privacyguides.org/tools/os/android/ 301
/android/ https://en.privacyguides.org/tools/os/android/ 301
/en/android/distributions/ https://en.privacyguides.org/tools/os/android/distributions/ 301
/android/distributions/ https://en.privacyguides.org/tools/os/android/distributions/ 301
/en/android/general-apps/ https://en.privacyguides.org/tools/os/android/general-apps/ 301
/android/general-apps/ https://en.privacyguides.org/tools/os/android/general-apps/ 301
/en/android/obtaining-apps/ https://en.privacyguides.org/tools/os/android/obtaining-apps/ 301
/android/obtaining-apps/ https://en.privacyguides.org/tools/os/android/obtaining-apps/ 301
/en/basics/account-creation/ https://en.privacyguides.org/wiki/basics/account-creation/ 301
/basics/account-creation/ https://en.privacyguides.org/wiki/basics/account-creation/ 301
/en/basics/account-deletion/ https://en.privacyguides.org/wiki/basics/account-deletion/ 301
/basics/account-deletion/ https://en.privacyguides.org/wiki/basics/account-deletion/ 301
/en/basics/common-misconceptions/ https://en.privacyguides.org/wiki/basics/common-misconceptions/ 301
/basics/common-misconceptions/ https://en.privacyguides.org/wiki/basics/common-misconceptions/ 301
/en/basics/common-threats/ https://en.privacyguides.org/wiki/basics/common-threats/ 301
/basics/common-threats/ https://en.privacyguides.org/wiki/basics/common-threats/ 301
/en/basics/email-security/ https://en.privacyguides.org/wiki/basics/email-security/ 301
/basics/email-security/ https://en.privacyguides.org/wiki/basics/email-security/ 301
/en/basics/hardware/ https://en.privacyguides.org/wiki/basics/hardware/ 301
/basics/hardware/ https://en.privacyguides.org/wiki/basics/hardware/ 301
/en/basics/multi-factor-authentication/ https://en.privacyguides.org/wiki/basics/multi-factor-authentication/ 301
/basics/multi-factor-authentication/ https://en.privacyguides.org/wiki/basics/multi-factor-authentication/ 301
/en/basics/passwords-overview/ https://en.privacyguides.org/wiki/basics/passwords-overview/ 301
/basics/passwords-overview/ https://en.privacyguides.org/wiki/basics/passwords-overview/ 301
/en/basics/threat-modeling/ https://en.privacyguides.org/wiki/basics/threat-modeling/ 301
/basics/threat-modeling/ https://en.privacyguides.org/wiki/basics/threat-modeling/ 301
/en/basics/vpn-overview/ https://en.privacyguides.org/wiki/basics/vpn-overview/ 301
/basics/vpn-overview/ https://en.privacyguides.org/wiki/basics/vpn-overview/ 301
/en/basics/why-privacy-matters/ https://en.privacyguides.org/wiki/basics/why-privacy-matters/ 301
/basics/why-privacy-matters/ https://en.privacyguides.org/wiki/basics/why-privacy-matters/ 301
/en/browser-extensions/ https://en.privacyguides.org/tools/software/browser-extensions/ 301
/browser-extensions/ https://en.privacyguides.org/tools/software/browser-extensions/ 301
/en/calendar/ https://en.privacyguides.org/tools/services/calendar/ 301
/calendar/ https://en.privacyguides.org/tools/services/calendar/ 301
/en/cloud/ https://en.privacyguides.org/tools/services/cloud/ 301
/cloud/ https://en.privacyguides.org/tools/services/cloud/ 301
/en/cryptocurrency/ https://en.privacyguides.org/tools/software/cryptocurrency/ 301
/cryptocurrency/ https://en.privacyguides.org/tools/software/cryptocurrency/ 301
/en/data-broker-removals/ https://en.privacyguides.org/tools/services/data-broker-removals/ 301
/data-broker-removals/ https://en.privacyguides.org/tools/services/data-broker-removals/ 301
/en/data-redaction/ https://en.privacyguides.org/tools/software/data-redaction/ 301
/data-redaction/ https://en.privacyguides.org/tools/software/data-redaction/ 301
/en/desktop-browsers/ https://en.privacyguides.org/tools/software/desktop-browsers/ 301
/desktop-browsers/ https://en.privacyguides.org/tools/software/desktop-browsers/ 301
/en/desktop/ https://en.privacyguides.org/tools/os/desktop/ 301
/desktop/ https://en.privacyguides.org/tools/os/desktop/ 301
/en/device-integrity/ https://en.privacyguides.org/tools/advanced/device-integrity/ 301
/device-integrity/ https://en.privacyguides.org/tools/advanced/device-integrity/ 301
/en/dns/ https://en.privacyguides.org/tools/services/dns/ 301
/dns/ https://en.privacyguides.org/tools/services/dns/ 301
/en/document-collaboration/ https://en.privacyguides.org/tools/software/document-collaboration/ 301
/document-collaboration/ https://en.privacyguides.org/tools/software/document-collaboration/ 301
/en/email-aliasing/ https://en.privacyguides.org/tools/services/email-aliasing/ 301
/email-aliasing/ https://en.privacyguides.org/tools/services/email-aliasing/ 301
/en/email-clients/ https://en.privacyguides.org/tools/software/email-clients/ 301
/email-clients/ https://en.privacyguides.org/tools/software/email-clients/ 301
/en/email/ https://en.privacyguides.org/tools/services/email/ 301
/email/ https://en.privacyguides.org/tools/services/email/ 301
/en/encryption/ https://en.privacyguides.org/tools/software/encryption/ 301
/encryption/ https://en.privacyguides.org/tools/software/encryption/ 301
/en/file-sharing/ https://en.privacyguides.org/tools/software/file-sharing/ 301
/file-sharing/ https://en.privacyguides.org/tools/software/file-sharing/ 301
/en/financial-services/ https://en.privacyguides.org/tools/services/financial-services/ 301
/financial-services/ https://en.privacyguides.org/tools/services/financial-services/ 301
/en/frontends/ https://en.privacyguides.org/tools/software/frontends/ 301
/frontends/ https://en.privacyguides.org/tools/software/frontends/ 301
/en/health-and-wellness/ https://en.privacyguides.org/tools/software/health-and-wellness/ 301
/health-and-wellness/ https://en.privacyguides.org/tools/software/health-and-wellness/ 301
/en/language-tools/ https://en.privacyguides.org/tools/software/language-tools/ 301
/language-tools/ https://en.privacyguides.org/tools/software/language-tools/ 301
/en/maps/ https://en.privacyguides.org/tools/software/maps/ 301
/maps/ https://en.privacyguides.org/tools/software/maps/ 301
/en/meta/admonitions/ https://github.com/privacyguides/privacyguides.org 301
/meta/admonitions/ https://github.com/privacyguides/privacyguides.org 301
/en/meta/brand/ https://github.com/privacyguides/brand 301
/meta/brand/ https://github.com/privacyguides/brand 301
/en/meta/commit-messages/ https://github.com/privacyguides/privacyguides.org 301
/meta/commit-messages/ https://github.com/privacyguides/privacyguides.org 301
/en/meta/git-recommendations/ https://github.com/privacyguides/privacyguides.org 301
/meta/git-recommendations/ https://github.com/privacyguides/privacyguides.org 301
/en/meta/pr-comments/ https://github.com/privacyguides/privacyguides.org 301
/meta/pr-comments/ https://github.com/privacyguides/privacyguides.org 301
/en/meta/translations/ https://crowdin.com/project/privacyguides 301
/meta/translations/ https://crowdin.com/project/privacyguides 301
/en/meta/uploading-images/ https://github.com/privacyguides/privacyguides.org 301
/meta/uploading-images/ https://github.com/privacyguides/privacyguides.org 301
/en/meta/writing-style/ https://github.com/privacyguides/privacyguides.org 301
/meta/writing-style/ https://github.com/privacyguides/privacyguides.org 301
/en/mobile-browsers/ https://en.privacyguides.org/tools/software/mobile-browsers/ 301
/mobile-browsers/ https://en.privacyguides.org/tools/software/mobile-browsers/ 301
/en/mobile-phones/ https://en.privacyguides.org/tools/hardware/mobile-phones/ 301
/mobile-phones/ https://en.privacyguides.org/tools/hardware/mobile-phones/ 301
/en/multi-factor-authentication/ https://en.privacyguides.org/tools/software/multi-factor-authentication/ 301
/multi-factor-authentication/ https://en.privacyguides.org/tools/software/multi-factor-authentication/ 301
/en/news-aggregators/ https://en.privacyguides.org/tools/software/news-aggregators/ 301
/news-aggregators/ https://en.privacyguides.org/tools/software/news-aggregators/ 301
/en/notebooks/ https://en.privacyguides.org/tools/software/notebooks/ 301
/notebooks/ https://en.privacyguides.org/tools/software/notebooks/ 301
/en/office-suites/ https://en.privacyguides.org/tools/software/office-suites/ 301
/office-suites/ https://en.privacyguides.org/tools/software/office-suites/ 301
/en/os/ https://en.privacyguides.org/wiki/os/ 301
/os/ https://en.privacyguides.org/wiki/os/ 301
/en/os/android-overview/ https://en.privacyguides.org/wiki/os/android/ 301
/os/android-overview/ https://en.privacyguides.org/wiki/os/android/ 301
/en/os/ios-overview/ https://en.privacyguides.org/wiki/os/ios/ 301
/os/ios-overview/ https://en.privacyguides.org/wiki/os/ios/ 301
/en/os/linux-overview/ https://en.privacyguides.org/wiki/os/linux/ 301
/os/linux-overview/ https://en.privacyguides.org/wiki/os/linux/ 301
/en/os/macos-overview/ https://en.privacyguides.org/wiki/os/macos/ 301
/os/macos-overview/ https://en.privacyguides.org/wiki/os/macos/ 301
/en/os/qubes-overview/ https://en.privacyguides.org/wiki/os/qubes/ 301
/os/qubes-overview/ https://en.privacyguides.org/wiki/os/qubes/ 301
/en/os/windows/ https://en.privacyguides.org/wiki/os/windows/ 301
/os/windows/ https://en.privacyguides.org/wiki/os/windows/ 301
/en/os/windows/group-policies/ https://en.privacyguides.org/wiki/os/windows/group-policies/ 301
/os/windows/group-policies/ https://en.privacyguides.org/wiki/os/windows/group-policies/ 301
/en/passwords/ https://en.privacyguides.org/tools/software/passwords/ 301
/passwords/ https://en.privacyguides.org/tools/software/passwords/ 301
/en/pastebins/ https://en.privacyguides.org/tools/software/pastebins/ 301
/pastebins/ https://en.privacyguides.org/tools/software/pastebins/ 301
/en/photo-management/ https://en.privacyguides.org/tools/services/photo-backups/ 301
/photo-management/ https://en.privacyguides.org/tools/services/photo-backups/ 301
/en/privacy/ https://en.privacyguides.org/privacy/ 301
/privacy/ https://en.privacyguides.org/privacy/ 301
/en/real-time-communication/ https://en.privacyguides.org/tools/services/messengers/ 301
/real-time-communication/ https://en.privacyguides.org/tools/services/messengers/ 301
/en/router/ https://en.privacyguides.org/tools/os/router-firmware/ 301
/router/ https://en.privacyguides.org/tools/os/router-firmware/ 301
/en/search-engines/ https://en.privacyguides.org/tools/services/search-engines/ 301
/search-engines/ https://en.privacyguides.org/tools/services/search-engines/ 301
/en/security-keys/ https://en.privacyguides.org/tools/hardware/security-keys/ 301
/security-keys/ https://en.privacyguides.org/tools/hardware/security-keys/ 301
/en/self-hosting/ https://en.privacyguides.org/tools/self-hosting/ 301
/self-hosting/ https://en.privacyguides.org/tools/self-hosting/ 301
/en/self-hosting/dns-filtering/ https://en.privacyguides.org/tools/self-hosting/dns-filtering/ 301
/self-hosting/dns-filtering/ https://en.privacyguides.org/tools/self-hosting/dns-filtering/ 301
/en/self-hosting/email-servers/ https://en.privacyguides.org/tools/self-hosting/email-servers/ 301
/self-hosting/email-servers/ https://en.privacyguides.org/tools/self-hosting/email-servers/ 301
/en/self-hosting/file-management/ https://en.privacyguides.org/tools/self-hosting/file-management/ 301
/self-hosting/file-management/ https://en.privacyguides.org/tools/self-hosting/file-management/ 301
/en/social-networks/ https://en.privacyguides.org/tools/software/social-networks/ 301
/social-networks/ https://en.privacyguides.org/tools/software/social-networks/ 301
/en/tools/ https://en.privacyguides.org/tools/ 301
/tools/ https://en.privacyguides.org/tools/ 301
/en/tor/ https://en.privacyguides.org/tools/software/tor/ 301
/tor/ https://en.privacyguides.org/tools/software/tor/ 301
/en/vpn/ https://en.privacyguides.org/tools/services/vpn/ 301
/vpn/ https://en.privacyguides.org/tools/services/vpn/ 301
+2
View File
@@ -1,6 +1,8 @@
---
title: Privacy Guides
layout: pg-home
aliases:
- /en
---
<div class=" hextra-feature-grid hx:grid hx:sm:max-lg:grid-cols-2 hx:max-sm:grid-cols-1 hx:gap-4 hx:w-full not-prose" style="--hextra-feature-grid-cols: 2; ">
+4
View File
@@ -4,6 +4,10 @@ description: Privacy Guides is a socially motivated website that provides inform
breadcrumbs: false
cascade:
type: docs
aliases:
- /about/contributors
- /en/about
- /en/about/contributors
---
![Privacy Guides logo](./pg-yellow.svg)
{ .pg:image:right }
+2
View File
@@ -1,6 +1,8 @@
---
title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
aliases:
- /en/about/criteria
---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+2
View File
@@ -1,6 +1,8 @@
---
title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
aliases:
- /en/about/donate
---
<style>
.hextra-tabs-panel img {
@@ -1,6 +1,8 @@
---
title: Donation Acceptance Policy
description: Privacy Guides aspires to obtain funding from a wide variety of sources to reduce our dependency on any single donor. Please consider donating!
aliases:
- /en/about/donation-acceptance-policy
---
Privacy Guides takes the ethical responsibility of making unbiased recommendations on its website very seriously.
+2
View File
@@ -1,6 +1,8 @@
---
title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
aliases:
- /en/about/executive-policy
---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.
+8
View File
@@ -1,6 +1,14 @@
---
title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
aliases:
- /about/jobs/content-creator
- /about/jobs/intern-news
- /about/jobs/journalist
- /en/about/jobs
- /en/about/jobs/content-creator
- /en/about/jobs/intern-news
- /en/about/jobs/journalist
---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause.
+2
View File
@@ -1,6 +1,8 @@
---
title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
aliases:
- /en/about/notices
---
## Legal Disclaimer
+2
View File
@@ -1,6 +1,8 @@
---
title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
aliases:
- /en/about/privacytools
---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.
+2
View File
@@ -1,6 +1,8 @@
---
title: Privacy Guides Services
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
aliases:
- /en/about/services
---
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
+2
View File
@@ -1,6 +1,8 @@
---
title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
aliases:
- /en/about/statistics
---
<!-- markdownlint-disable MD051 -->
We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below.
+2
View File
@@ -9,6 +9,8 @@ cover: banner-activism.webp
breadcrumbs: false
cascade:
type: docs
aliases:
- /en/activism
---
The **Guides and Tools for Privacy Activists** project from [*Privacy Guides*](../about/) offers a new way to empower the digital rights community.
@@ -4,7 +4,8 @@ description: The DPA Directory is a tool to help you find the principal consumer
# sidebar:
# hide: true
aliases:
- /activism/legal
- /activism/legal
- /en/activism/legal/dpa-directory
---
<style>
+2
View File
@@ -2,6 +2,8 @@
title: "Privacy Activist Toolbox"
description: The Privacy Activist Toolbox is a unique resource with tips for anyone interested in becoming a better privacy rights activist, or anyone who wants to start.
toc: true
aliases:
- /en/activism/toolbox
---
The **Privacy Activist Toolbox** is a resource for anyone interested in becoming a better privacy rights activist, or anyone who wants to start advocating for privacy rights.
@@ -4,6 +4,8 @@ description: Kindness and patience are essential qualities for privacy advocates
icon: fontawesome/solid/hands-holding-circle
cover: banner-toolbox-tip-kind.webp
weight: 11
aliases:
- /en/activism/toolbox/tip-be-kind-to-people-but-be-relentless-with-institutions
---
Kindness and patience are essential qualities for privacy advocates. To grow our movement, we must meet people from a place of camaraderie. People don't change their mind by being berated. However, this isn't true for institutions.
@@ -4,6 +4,8 @@ description: Accessibility should always be a priority in our work. To make our
icon: fontawesome/solid/heart-circle-check
cover: banner-toolbox-tip-accessibility.webp
weight: 17
aliases:
- /en/activism/toolbox/tip-be-mindful-of-accessibility
---
**Accessibility** is indispensable to [inclusivity](../tip-keep-your-posts-and-community-inclusive/), and should always be a priority in our work. To make our privacy communities welcoming to all, accessibility cannot be an afterthought. We must integrate it in our practice from the start. This means making sure the languages, visuals, tools, and venues we use are accessible to as many people as possible.
@@ -4,6 +4,8 @@ description: In your privacy advocacy, it's important to recommend tools that re
icon: fontawesome/solid/skull-crossbones
cover: banner-toolbox-tip-snakeoil.webp
weight: 3
aliases:
- /en/activism/toolbox/tip-beware-of-privacy-snake-oil
---
In your privacy advocacy, it's essential to use and recommend tools that *reliably* protect privacy. For this, you need to **investigate and remain highly skeptical** of any dangerous or unproven marketing claims.
@@ -4,6 +4,8 @@ description: To give actionable privacy advices, it's essential to consider ever
icon: fontawesome/solid/users-between-lines
cover: banner-toolbox-tip-everyone.webp
weight: 8
aliases:
- /en/activism/toolbox/tip-consider-everyones-unique-situation
---
Everyone has different needs, and everyone faces different dangers when their personal data gets exposed.
@@ -4,6 +4,8 @@ description: When we think about privacy, we often focus on technical individual
icon: fontawesome/solid/users-rays
cover: banner-toolbox-tip-expand.webp
weight: 6
aliases:
- /en/activism/toolbox/tip-dont-stop-at-individual-solutions
---
When we think about our privacy, we often focus on the technical tools we can use to protect it. While this is an important *component*, it's crucial not to lose sight of how regulations and invasive practices impact us collectively.
@@ -4,6 +4,8 @@ description: Once you have the knowledge, motivation, and energy to fight for pr
icon: fontawesome/solid/bullhorn
cover: banner-toolbox-tip-engage.webp
weight: 24
aliases:
- /en/activism/toolbox/tip-engage-boosts-and-contribute
---
Once you have the knowledge, motivation, and energy, **it's time to act**! Perhaps you've read all the tips here, or have read through our [Knowledge Base](../../../wiki/basics/why-privacy-matters/index.md) already! But you don't need to know that much about privacy to start contributing.
@@ -4,6 +4,8 @@ description: To succeed with our movement to defend privacy rights, we must supp
icon: fontawesome/solid/thumbs-up
cover: banner-toolbox-tip-credit.webp
weight: 14
aliases:
- /en/activism/toolbox/tip-give-credit-where-credit-is-due
---
To succeed in our battle, we must **support each other**. One good way to accomplish this is to never forget to give credit where credit is due. When another advocate or organization says something you agree with, boost them up, spread their reach, and thank them publicly.
@@ -4,6 +4,8 @@ description: Commercial social media platforms represent one of the biggest sour
icon: fontawesome/solid/seedling
cover: banner-toolbox-tip-plant.webp
weight: 5
aliases:
- /en/activism/toolbox/tip-improve-your-social-media-and-build-resilient-communities
---
Commercial social media platforms represent one of the biggest source of data exploitation. Facebook, Instagram, Threads, TikTok, and X all exploit their users' data to generate billions in profit every year. By staying active on these platforms, we continue to feed the beast and indirectly support this invasion of privacy rights.
@@ -4,6 +4,8 @@ description: Privacy isn't just about the tools, or just about the laws, or just
icon: fontawesome/solid/globe
cover: banner-toolbox-tip-landscape.webp
weight: 7
aliases:
- /en/activism/toolbox/tip-keep-in-mind-the-whole-landscape
---
Privacy isn't just about the tools, the laws, or the practices of any individual or organization. It's about *all* of that. To move our society in a place where everyone benefits from privacy by default, we must consider technologies, laws, and culture holistically.
@@ -4,6 +4,8 @@ description: Inclusivity is essential to grow our privacy movement. If we want p
icon: fontawesome/solid/heart-circle-plus
cover: banner-toolbox-tip-inclusivity.webp
weight: 16
aliases:
- /en/activism/toolbox/tip-keep-your-posts-and-community-inclusive
---
**Inclusivity** is not only the right thing to do, it's also essential to grow our movement. If we want privacy rights to succeed, it's imperative that we build communities where *everyone* feels safe and welcomed, regardless of who they are or where they come from.
@@ -4,6 +4,8 @@ description: Being well-informed about the data protection regulations in your o
icon: fontawesome/solid/balance-scale
cover: banner-toolbox-tip-laws.webp
weight: 1
aliases:
- /en/activism/toolbox/tip-know-your-privacy-laws
---
Being well-informed about the **data protection regulations** in your own jurisdiction can be a significant asset for your personal and collective battles to improve privacy, for yourself and for others.
@@ -4,6 +4,8 @@ description: If you've been a privacy advocate for a while, maybe it's time to l
icon: fontawesome/solid/fist-raised
cover: banner-toolbox-tip-organize.webp
weight: 25
aliases:
- /en/activism/toolbox/tip-level-up-assemble-and-organize
---
If you've been a privacy advocate for a while, maybe it's time to level up and **grow as a leader** in your community.
@@ -4,6 +4,8 @@ description: The battle for privacy rights is difficult, and its defenders are s
icon: fontawesome/solid/hand-holding-hand
cover: banner-toolbox-tip-lift.webp
weight: 9
aliases:
- /en/activism/toolbox/tip-lift-your-allies-up
---
At times, it might feel like the privacy community is niche and isolated.
@@ -4,6 +4,8 @@ description: If you are developing a privacy-focused application or website, it'
icon: fontawesome/solid/cat
cover: banner-toolbox-tip-cute.webp
weight: 18
aliases:
- /en/activism/toolbox/tip-make-it-cute
---
If you are developing a privacy-focused application or website, it's important that you **do not neglect the design** aspect of it. This is a common mistake that can have a significant negative impact on adoption by a general audience. Make it cute!
@@ -4,6 +4,8 @@ description: As privacy activists, it's important to lead by example and support
icon: fontawesome/solid/arrow-right-from-bracket
cover: banner-toolbox-tip-migrate.webp
weight: 4
aliases:
- /en/activism/toolbox/tip-migrate-outside-the-surveillance-ecosystem
---
As privacy activists, it's not only important to support the tools and organizations with good privacy practices, but also to lead by example when it comes to **moving away from the surveillance ecosystem**. We cannot afford to compromise our principles simply for [convenience](https://www.privacyguides.org/articles/2025/06/07/selling-surveillance-as-convenience/).
@@ -4,6 +4,8 @@ description: Through your privacy work, it's crucial to protect the data of your
icon: fontawesome/solid/shield-heart
cover: banner-toolbox-tip-protect.webp
weight: 21
aliases:
- /en/activism/toolbox/tip-protect-your-allies
---
Through your privacy advocacy work, be careful to never collect or share the data of others without their prior explicit consent. It's crucial to **protect your allies' data** in all that you do, whether it's individual action, organizing an event, or leading an organization.
@@ -4,6 +4,8 @@ description: As privacy activists, we must be a voice for resistance and take a
icon: fontawesome/solid/xmark-circle
cover: banner-toolbox-tip-refuse.webp
weight: 19
aliases:
- /en/activism/toolbox/tip-refuse-to-participate
---
As privacy advocates and activists, it's important to **be a voice for resistance** and take a stand against abusive practices. One substantial way to do this is to refuse to participate in privacy-intrusive requests, or use invasive software.
@@ -4,6 +4,8 @@ description: Submitting an official complaint for violation of your privacy righ
icon: fontawesome/solid/gavel
cover: banner-toolbox-tip-report.webp
weight: 2
aliases:
- /en/activism/toolbox/tip-report-privacy-violations
---
Once you are [informed on your local privacy laws](../tip-know-your-privacy-laws/), it's important to get familiar with the process to **report violations of the law**. Submitting an official complaint is often simple, and can have a significant impact both for yourself and for your community.
@@ -4,6 +4,8 @@ description: There is so much to do to improve privacy rights. So much, that it'
icon: fontawesome/solid/puzzle-piece
cover: banner-toolbox-tip-small.webp
weight: 22
aliases:
- /en/activism/toolbox/tip-small-actions-matter
---
There is so much to do in the movement for better privacy rights. So much, that it's sometimes easy to feel discouraged when facing the scale of what's left to accomplish. But **everything helps**. Every small improvement counts, and every small victory should be celebrated.
@@ -4,6 +4,8 @@ description: People in the privacy community can have different views that can c
icon: fontawesome/solid/handshake-angle
cover: banner-toolbox-tip-alliances.webp
weight: 12
aliases:
- /en/activism/toolbox/tip-start-alliances-not-wars
---
The privacy community consists of a patchwork of individuals, activists, organizations, and businesses that sometimes hold quite different views. These divergences can create conflict and friction at times.
@@ -4,6 +4,8 @@ description: If you manage a digital rights group, it's important to make sure y
icon: fontawesome/solid/star
cover: banner-toolbox-tip-principles.webp
weight: 20
aliases:
- /en/activism/toolbox/tip-stay-true-to-your-principles
---
If you manage a digital rights group, meetup, chat room, event, or organization even, make sure you aren't subjecting your members and contributors to the very privacy-invasive tech you're fighting against. Sadly, it's not rare to see organizations and communities that aren't following their own privacy advice for internal practices.
@@ -4,6 +4,8 @@ description: Fighting for privacy rights is a collective endeavor. This battle c
icon: fontawesome/solid/hand-holding-heart
cover: banner-toolbox-tip-support.webp
weight: 10
aliases:
- /en/activism/toolbox/tip-support-your-privacy-comrades
---
Fighting for better privacy rights, privacy tools, and privacy practices is a collective endeavor. You cannot do it alone. Anyone around you contributing is fighting the same battle by your side. This battle *can* be difficult and isolating at times. That's why it's critical to care for each other.
@@ -4,6 +4,8 @@ description: The battle for privacy will be a long one. This isn't a sprint, it'
icon: fontawesome/solid/battery-quarter
cover: banner-toolbox-tip-rest.webp
weight: 23
aliases:
- /en/activism/toolbox/tip-take-time-to-rest
---
The battle for privacy rights will be a long one. This isn't a sprint, it's a marathon.
@@ -4,6 +4,8 @@ description: In privacy like everywhere else, diversity is a strength. If you wa
icon: fontawesome/solid/circle-half-stroke
cover: banner-toolbox-tip-complement.webp
weight: 13
aliases:
- /en/activism/toolbox/tip-value-allies-with-complementary-expertise
---
In privacy, like in other areas of life, **diversity is an incredible strength**. If you want your community to have a broad understanding of threat models, and be able to address issues on multiple levels, you need to value a diversity of expertises.
@@ -4,6 +4,8 @@ description: For our privacy rights movement to grow, we must bring more people
icon: fontawesome/solid/user-plus
cover: banner-toolbox-tip-beginners.webp
weight: 15
aliases:
- /en/activism/toolbox/tip-welcome-beginners
---
For our privacy rights movement to grow, we must **bring more people in**. To accomplish this, it's fundamental to discuss privacy in ways that are accessible to newcomers who aren't familiar with the basic concepts yet.
+2
View File
@@ -1,6 +1,8 @@
---
title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
aliases:
- /en/privacy
---
## What is Privacy Guides?
+2
View File
@@ -7,6 +7,8 @@ type: docs
cascade:
type: docs
contextMenu: true
aliases:
- /en/tools
---
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.
@@ -2,6 +2,8 @@
title: "Alternative Networks"
description: These tools allow you to access networks other than the World Wide Web.
aliases:
- /alternative-networks
- /en/alternative-networks
- /tools/advanced
---
<small>Protects against the following threat(s):</small>
@@ -2,6 +2,9 @@
title: "Device Integrity"
description: These tools can be used to check your devices for compromise.
robots: nofollow, max-snippet:-1, max-image-preview:large
aliases:
- /device-integrity
- /en/device-integrity
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
@@ -2,6 +2,8 @@
title: Mobile Phones
description: These mobile devices provide the best hardware security support for custom Android operating systems.
aliases:
- /mobile-phones
- /en/mobile-phones
- /tools/hardware
---
<small>Protects against the following threat(s):</small>
@@ -1,6 +1,9 @@
---
title: Security Keys
description: These security keys provide a form of phishing-immune authentication for accounts that support it.
aliases:
- /security-keys
- /en/security-keys
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals)
+2
View File
@@ -2,6 +2,8 @@
title: "Android"
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
aliases:
- /android
- /en/android
- /tools/os
---
<style>
@@ -1,6 +1,9 @@
---
title: Alternative Distributions
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
aliases:
- /android/distributions
- /en/android/distributions
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals)
@@ -1,6 +1,9 @@
---
title: "General Apps"
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
aliases:
- /android/general-apps
- /en/android/general-apps
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../../wiki/basics/common-threats/index.md#security-and-privacy)
@@ -1,6 +1,9 @@
---
title: "Obtaining Applications"
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
aliases:
- /android/obtaining-apps
- /en/android/obtaining-apps
---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.
+3
View File
@@ -1,6 +1,9 @@
---
title: "Desktop/PC"
description: Linux distributions are commonly recommended for privacy protection and software freedom.
aliases:
- /desktop
- /en/desktop
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
title: "Router Firmware"
description: Alternative operating systems for securing your router or Wi-Fi access point.
aliases:
- /router
- /en/router
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
+3
View File
@@ -5,4 +5,7 @@ weight: 60
build:
list: local
render: link
aliases:
- /self-hosting
- /en/self-hosting
---
@@ -2,7 +2,9 @@
title: DNS Filtering
description: For our more technical readers, self-hosting a DNS solution can provide filtering for devices not covered by cloud-based DNS solutions.
aliases:
- /self-hosting/dns-filtering
- /tools/self-hosting
- /en/self-hosting/dns-filtering
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: Email Servers
description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data.
aliases:
- /self-hosting/email-servers
- /en/self-hosting/email-servers
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: File Management
description: For our more technical readers, self-hosting file management tools can provide additional privacy assurances by having maximum control over your data.
aliases:
- /self-hosting/file-management
- /en/self-hosting/file-management
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
+2
View File
@@ -2,6 +2,8 @@
title: Calendar Sync
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
aliases:
- /calendar
- /en/calendar
- /tools/services
---
+3
View File
@@ -1,6 +1,9 @@
---
title: Cloud Storage
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
aliases:
- /cloud
- /en/cloud
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats/index.md#security-and-privacy)
@@ -1,6 +1,9 @@
---
title: Data Removal Services
description: Our recommended methods for removing your personal information from data brokers and people search sites.
aliases:
- /data-broker-removals
- /en/data-broker-removals
---
<small>Protects against the following threat(s):</small>
+3
View File
@@ -1,6 +1,9 @@
---
title: DNS Resolvers
description: We recommend choosing these encrypted DNS providers to replace your ISP's default configuration.
aliases:
- /dns
- /en/dns
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
title: "Email Aliasing"
description: An email aliasing service allows you to easily generate a new email address for every website you register for.
aliases:
- /email-aliasing
- /en/email-aliasing
---
<small>Protects against the following threat(s):</small>
+3
View File
@@ -1,6 +1,9 @@
---
title: Email Services
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
aliases:
- /email
- /en/email
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: Financial Services
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
aliases:
- /financial-services
- /en/financial-services
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
title: Instant Messengers
description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
aliases:
- /real-time-communication
- /en/real-time-communication
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats/index.md#security-and-privacy)
@@ -1,6 +1,9 @@
---
title: Photo Backups
description: These photo backup tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties.
aliases:
- /photo-management
- /en/photo-management
---
<small>Protects against the following threat(s):</small>
@@ -1,6 +1,9 @@
---
title: Search Engines
description: Use privacy-respecting search engines which don't build an advertising profile based on your searches.
aliases:
- /search-engines
- /en/search-engines
---
<small>Protects against the following threat(s):</small>
+3
View File
@@ -1,6 +1,9 @@
---
title: VPN Services
description: The best VPN services for protecting your privacy and security online. Find a provider here that isn't out to spy on you.
aliases:
- /vpn
- /en/vpn
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
+2
View File
@@ -2,6 +2,8 @@
title: "AI Chat"
description: Unlike OpenAI's ChatGPT and its Big Tech competitors, these AI tools run locally so your data never leaves your desktop device.
aliases:
- /ai-chat
- /en/ai-chat
- /tools/software
---
<small>Protects against the following threat(s):</small>
@@ -1,6 +1,9 @@
---
title: Browser Extensions
description: These browser extensions can enhance your browsing experience and protect your privacy.
aliases:
- /browser-extensions
- /en/browser-extensions
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency
aliases:
- /cryptocurrency
- /en/cryptocurrency
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats/index.md#mass-surveillance-programs)
@@ -1,6 +1,9 @@
---
title: "Data and Metadata Redaction"
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
aliases:
- /data-redaction
- /en/data-redaction
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats/index.md#limiting-public-information)
@@ -1,6 +1,9 @@
---
title: Desktop Browsers
description: These privacy-protecting browsers are what we currently recommend for standard/non-anonymous internet browsing on desktop systems.
aliases:
- /desktop-browsers
- /en/desktop-browsers
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
title: Document Collaboration
description: Most online office suites do not support end-to-end encryption, meaning the cloud provider has access to everything you do.
aliases:
- /document-collaboration
- /en/document-collaboration
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: "Email Clients"
description: These email clients are privacy-respecting and support OpenPGP email encryption.
aliases:
- /email-clients
- /en/email-clients
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: "Encryption Software"
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
aliases:
- /encryption
- /en/encryption
---
**Encryption** is the only secure way to control who can access your data. If you are currently not using encryption software for your hard disk, emails, or files, you should pick an option here.
@@ -1,6 +1,9 @@
---
title: File Sharing and Sync
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
aliases:
- /file-sharing
- /en/file-sharing
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: "Frontends"
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
aliases:
- /frontends
- /en/frontends
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
title: "Health and Wellness"
description: These applications are what we currently recommend for all health- and fitness-related activites on your phone.
aliases:
- /health-and-wellness
- /en/health-and-wellness
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: "Language Tools"
description: These language tools do not send your input text to a server and can be used offline and self-hosted.
aliases:
- /language-tools
- /en/language-tools
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
+3
View File
@@ -1,6 +1,9 @@
---
title: Maps and Navigation
description: Privacy-respecting map providers and navigation apps which don't build an advertising profile based on your searches and locations.
aliases:
- /maps
- /en/maps
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
title: Mobile Browsers
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
aliases:
- /mobile-browsers
- /en/mobile-browsers
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -1,6 +1,9 @@
---
title: Multifactor Authentication
description: These tools assist you with securing your internet accounts with multifactor authentication without sending your secrets to a third party.
aliases:
- /multi-factor-authentication
- /en/multi-factor-authentication
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals)
@@ -1,6 +1,9 @@
---
title: "News Aggregators"
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
aliases:
- /news-aggregators
- /en/news-aggregators
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: "Notebooks"
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party.
aliases:
- /notebooks
- /en/notebooks
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: "Office Suites"
description: These office suites offer their full functionality without an account and can be used offline.
aliases:
- /office-suites
- /en/office-suites
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,5 +1,8 @@
---
title: Local Password Managers
aliases:
- /passwords
- /en/passwords
---
These options allow you to manage an encrypted password database locally.
@@ -1,6 +1,9 @@
---
title: "Pastebins"
description: These tools allow you to have full control of any pasted data you share to other parties.
aliases:
- /pastebins
- /en/pastebins
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
@@ -1,6 +1,9 @@
---
title: Social Networks
description: Find a new social network that doesnt pry into your data or monetize your profile.
aliases:
- /social-networks
- /en/social-networks
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats/index.md#avoiding-censorship)
+3
View File
@@ -1,6 +1,9 @@
---
title: "Tor Browser"
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
aliases:
- /tor
- /en/tor
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
@@ -2,6 +2,9 @@
title: "Types of Communication Networks"
weight: 40
description: An overview of several network architectures commonly used by instant messaging applications.
aliases:
- /advanced/communication-network-types
- /en/advanced/communication-network-types
---
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../../basics/threat-modeling/index.md) when deciding which app to use.
@@ -3,7 +3,9 @@ title: "DNS Overview"
weight: 10
description: The Domain Name System is the "phonebook of the internet," helping your browser find the website it's looking for.
aliases:
- /advanced/dns-overview
- /wiki/advanced
- /en/advanced/dns-overview
---
The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phone book of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers.
+3
View File
@@ -2,6 +2,9 @@
title: Private Payments
weight: 30
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
aliases:
- /advanced/payments
- /en/advanced/payments
---
Data about your buying habits is considered the holy grail of ad targeting: Your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
@@ -2,6 +2,9 @@
title: "Tor Overview"
weight: 20
description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible.
aliases:
- /advanced/tor-overview
- /en/advanced/tor-overview
---
![Tor logo](tor.svg)
@@ -3,6 +3,9 @@ meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
weight: 50
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
aliases:
- /basics/account-creation
- /en/basics/account-creation
---
Often people sign up for services without thinking. Maybe it's a streaming service to watch that new show everyone's talking about, or an account that gives you a discount for your favorite fast food place. Whatever the case may be, you should consider the implications for your data now and later on down the line.
@@ -2,6 +2,9 @@
title: Account Deletion
weight: 60
description: It's easy to accumulate a large number of internet accounts. Here are some tips on how to prune your collection.
aliases:
- /basics/account-deletion
- /en/basics/account-deletion
---
Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach occurs when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence.
@@ -2,6 +2,9 @@
title: "Common Misconceptions"
weight: 40
description: Privacy isn't a straightforward topic, and it's easy to get caught up in marketing claims and other disinformation.
aliases:
- /basics/common-misconceptions
- /en/basics/common-misconceptions
---
## "Open-source software is always secure" or "Proprietary software is more secure"
@@ -2,6 +2,9 @@
title: "Common Threats"
weight: 30
description: Your threat model is personal to you, but these are some of the things many visitors to this site care about.
aliases:
- /basics/common-threats
- /en/basics/common-threats
---
Broadly speaking, we categorize our recommendations into the [threats](../threat-modeling/index.md) or goals that apply to most people. <mark>You may be concerned with none, one, a few, or all of these possibilities</mark>, and the tools and services you use depend on what your goals are. You may have specific threats outside these categories as well, which is perfectly fine! The important part is developing an understanding of the benefits and shortcomings of the tools you choose to use, because virtually none of them will protect you from every threat.
@@ -3,6 +3,9 @@ meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy
title: Email Security
weight: 100
description: Email is insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
aliases:
- /basics/email-security
- /en/basics/email-security
---
Email is an insecure form of communication by default. You can improve your email security with tools such as OpenPGP, which add end-to-end encryption to your messages, but OpenPGP still has a number of drawbacks compared to encryption in other messaging applications.
+3
View File
@@ -2,6 +2,9 @@
title: "Choosing Your Hardware"
weight: 90
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
aliases:
- /basics/hardware
- /en/basics/hardware
---
When it comes to discussions about privacy, hardware is often not thought about as much as what software we use. Your hardware should be considered the foundation on which you build the rest of your privacy setup.
@@ -2,6 +2,9 @@
title: Multifactor Authentication
weight: 80
description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others.
aliases:
- /basics/multi-factor-authentication
- /en/basics/multi-factor-authentication
---
**Multifactor Authentication** (**MFA**) is a security mechanism that requires additional steps beyond entering your username (or email) and password. The most common method is time limited codes you might receive from SMS or an app.

Some files were not shown because too many files have changed in this diff Show More