mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2026-05-24 12:21:21 +00:00
feat: Redirect old permalinks to new ones
This commit is contained in:
@@ -7,6 +7,8 @@ type: docs
|
||||
cascade:
|
||||
type: docs
|
||||
contextMenu: true
|
||||
aliases:
|
||||
- /en/tools
|
||||
---
|
||||
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.
|
||||
|
||||
|
||||
@@ -2,6 +2,8 @@
|
||||
title: "Alternative Networks"
|
||||
description: These tools allow you to access networks other than the World Wide Web.
|
||||
aliases:
|
||||
- /alternative-networks
|
||||
- /en/alternative-networks
|
||||
- /tools/advanced
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,9 @@
|
||||
title: "Device Integrity"
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
aliases:
|
||||
- /device-integrity
|
||||
- /en/device-integrity
|
||||
---
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
|
||||
@@ -2,6 +2,8 @@
|
||||
title: Mobile Phones
|
||||
description: These mobile devices provide the best hardware security support for custom Android operating systems.
|
||||
aliases:
|
||||
- /mobile-phones
|
||||
- /en/mobile-phones
|
||||
- /tools/hardware
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Security Keys
|
||||
description: These security keys provide a form of phishing-immune authentication for accounts that support it.
|
||||
aliases:
|
||||
- /security-keys
|
||||
- /en/security-keys
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals)
|
||||
|
||||
@@ -2,6 +2,8 @@
|
||||
title: "Android"
|
||||
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
|
||||
aliases:
|
||||
- /android
|
||||
- /en/android
|
||||
- /tools/os
|
||||
---
|
||||
<style>
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Alternative Distributions
|
||||
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
|
||||
aliases:
|
||||
- /android/distributions
|
||||
- /en/android/distributions
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Targeted Attacks" color="red" >}}](../../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "General Apps"
|
||||
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
aliases:
|
||||
- /android/general-apps
|
||||
- /en/android/general-apps
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Passive Attacks" color="amber" >}}](../../../../wiki/basics/common-threats/index.md#security-and-privacy)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Obtaining Applications"
|
||||
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
|
||||
aliases:
|
||||
- /android/obtaining-apps
|
||||
- /en/android/obtaining-apps
|
||||
---
|
||||
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.
|
||||
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Desktop/PC"
|
||||
description: Linux distributions are commonly recommended for privacy protection and software freedom.
|
||||
aliases:
|
||||
- /desktop
|
||||
- /en/desktop
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Router Firmware"
|
||||
description: Alternative operating systems for securing your router or Wi-Fi access point.
|
||||
aliases:
|
||||
- /router
|
||||
- /en/router
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -5,4 +5,7 @@ weight: 60
|
||||
build:
|
||||
list: local
|
||||
render: link
|
||||
aliases:
|
||||
- /self-hosting
|
||||
- /en/self-hosting
|
||||
---
|
||||
|
||||
@@ -2,7 +2,9 @@
|
||||
title: DNS Filtering
|
||||
description: For our more technical readers, self-hosting a DNS solution can provide filtering for devices not covered by cloud-based DNS solutions.
|
||||
aliases:
|
||||
- /self-hosting/dns-filtering
|
||||
- /tools/self-hosting
|
||||
- /en/self-hosting/dns-filtering
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Email Servers
|
||||
description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data.
|
||||
aliases:
|
||||
- /self-hosting/email-servers
|
||||
- /en/self-hosting/email-servers
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: File Management
|
||||
description: For our more technical readers, self-hosting file management tools can provide additional privacy assurances by having maximum control over your data.
|
||||
aliases:
|
||||
- /self-hosting/file-management
|
||||
- /en/self-hosting/file-management
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -2,6 +2,8 @@
|
||||
title: Calendar Sync
|
||||
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
|
||||
aliases:
|
||||
- /calendar
|
||||
- /en/calendar
|
||||
- /tools/services
|
||||
---
|
||||
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Cloud Storage
|
||||
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
|
||||
aliases:
|
||||
- /cloud
|
||||
- /en/cloud
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats/index.md#security-and-privacy)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Data Removal Services
|
||||
description: Our recommended methods for removing your personal information from data brokers and people search sites.
|
||||
aliases:
|
||||
- /data-broker-removals
|
||||
- /en/data-broker-removals
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: DNS Resolvers
|
||||
description: We recommend choosing these encrypted DNS providers to replace your ISP's default configuration.
|
||||
aliases:
|
||||
- /dns
|
||||
- /en/dns
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Email Aliasing"
|
||||
description: An email aliasing service allows you to easily generate a new email address for every website you register for.
|
||||
aliases:
|
||||
- /email-aliasing
|
||||
- /en/email-aliasing
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Email Services
|
||||
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
|
||||
aliases:
|
||||
- /email
|
||||
- /en/email
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Financial Services
|
||||
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
|
||||
aliases:
|
||||
- /financial-services
|
||||
- /en/financial-services
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Instant Messengers
|
||||
description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
|
||||
aliases:
|
||||
- /real-time-communication
|
||||
- /en/real-time-communication
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats/index.md#security-and-privacy)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Photo Backups
|
||||
description: These photo backup tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties.
|
||||
aliases:
|
||||
- /photo-management
|
||||
- /en/photo-management
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Search Engines
|
||||
description: Use privacy-respecting search engines which don't build an advertising profile based on your searches.
|
||||
aliases:
|
||||
- /search-engines
|
||||
- /en/search-engines
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: VPN Services
|
||||
description: The best VPN services for protecting your privacy and security online. Find a provider here that isn't out to spy on you.
|
||||
aliases:
|
||||
- /vpn
|
||||
- /en/vpn
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -2,6 +2,8 @@
|
||||
title: "AI Chat"
|
||||
description: Unlike OpenAI's ChatGPT and its Big Tech competitors, these AI tools run locally so your data never leaves your desktop device.
|
||||
aliases:
|
||||
- /ai-chat
|
||||
- /en/ai-chat
|
||||
- /tools/software
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Browser Extensions
|
||||
description: These browser extensions can enhance your browsing experience and protect your privacy.
|
||||
aliases:
|
||||
- /browser-extensions
|
||||
- /en/browser-extensions
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
|
||||
title: Cryptocurrency
|
||||
aliases:
|
||||
- /cryptocurrency
|
||||
- /en/cryptocurrency
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats/index.md#mass-surveillance-programs)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Data and Metadata Redaction"
|
||||
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
|
||||
aliases:
|
||||
- /data-redaction
|
||||
- /en/data-redaction
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats/index.md#limiting-public-information)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Desktop Browsers
|
||||
description: These privacy-protecting browsers are what we currently recommend for standard/non-anonymous internet browsing on desktop systems.
|
||||
aliases:
|
||||
- /desktop-browsers
|
||||
- /en/desktop-browsers
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Document Collaboration
|
||||
description: Most online office suites do not support end-to-end encryption, meaning the cloud provider has access to everything you do.
|
||||
aliases:
|
||||
- /document-collaboration
|
||||
- /en/document-collaboration
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Email Clients"
|
||||
description: These email clients are privacy-respecting and support OpenPGP email encryption.
|
||||
aliases:
|
||||
- /email-clients
|
||||
- /en/email-clients
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Encryption Software"
|
||||
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
|
||||
aliases:
|
||||
- /encryption
|
||||
- /en/encryption
|
||||
---
|
||||
**Encryption** is the only secure way to control who can access your data. If you are currently not using encryption software for your hard disk, emails, or files, you should pick an option here.
|
||||
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: File Sharing and Sync
|
||||
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
||||
aliases:
|
||||
- /file-sharing
|
||||
- /en/file-sharing
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Frontends"
|
||||
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
|
||||
aliases:
|
||||
- /frontends
|
||||
- /en/frontends
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Health and Wellness"
|
||||
description: These applications are what we currently recommend for all health- and fitness-related activites on your phone.
|
||||
aliases:
|
||||
- /health-and-wellness
|
||||
- /en/health-and-wellness
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Language Tools"
|
||||
description: These language tools do not send your input text to a server and can be used offline and self-hosted.
|
||||
aliases:
|
||||
- /language-tools
|
||||
- /en/language-tools
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Maps and Navigation
|
||||
description: Privacy-respecting map providers and navigation apps which don't build an advertising profile based on your searches and locations.
|
||||
aliases:
|
||||
- /maps
|
||||
- /en/maps
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Mobile Browsers
|
||||
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
|
||||
aliases:
|
||||
- /mobile-browsers
|
||||
- /en/mobile-browsers
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Multifactor Authentication
|
||||
description: These tools assist you with securing your internet accounts with multifactor authentication without sending your secrets to a third party.
|
||||
aliases:
|
||||
- /multi-factor-authentication
|
||||
- /en/multi-factor-authentication
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "News Aggregators"
|
||||
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
|
||||
aliases:
|
||||
- /news-aggregators
|
||||
- /en/news-aggregators
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Notebooks"
|
||||
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party.
|
||||
aliases:
|
||||
- /notebooks
|
||||
- /en/notebooks
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Office Suites"
|
||||
description: These office suites offer their full functionality without an account and can be used offline.
|
||||
aliases:
|
||||
- /office-suites
|
||||
- /en/office-suites
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,5 +1,8 @@
|
||||
---
|
||||
title: Local Password Managers
|
||||
aliases:
|
||||
- /passwords
|
||||
- /en/passwords
|
||||
---
|
||||
These options allow you to manage an encrypted password database locally.
|
||||
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Pastebins"
|
||||
description: These tools allow you to have full control of any pasted data you share to other parties.
|
||||
aliases:
|
||||
- /pastebins
|
||||
- /en/pastebins
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Social Networks
|
||||
description: Find a new social network that doesn’t pry into your data or monetize your profile.
|
||||
aliases:
|
||||
- /social-networks
|
||||
- /en/social-networks
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats/index.md#avoiding-censorship)
|
||||
|
||||
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: "Tor Browser"
|
||||
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
|
||||
aliases:
|
||||
- /tor
|
||||
- /en/tor
|
||||
---
|
||||
<small>Protects against the following threat(s):</small>
|
||||
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats/index.md#surveillance-as-a-business-model)
|
||||
|
||||
Reference in New Issue
Block a user