1
1
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2026-05-20 10:21:31 +00:00

feat!: Separate full list of tools into new page

This commit is contained in:
2026-05-08 22:44:19 -05:00
parent 6057ce2121
commit 2a2aabe9dc
67 changed files with 401 additions and 703 deletions
+1 -1
View File
@@ -1,4 +1,4 @@
---
title: Software
weight: 2
weight: 30
---
-87
View File
@@ -1,87 +0,0 @@
---
title: Calendar Sync
icon: material/calendar
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
cover: calendar.webp
---
<small>Protects against the following threat(s):</small>
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
**Calendars** contain some of your most sensitive data; use products that implement end-to-end encryption at rest to prevent a provider from reading them.
## Tuta
<div class="admonition recommendation" markdown>
![Tuta logo](assets/img/email/tuta.svg#only-light){ align=right }
![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ align=right }
**Tuta** offers a free and encrypted calendar across their supported platforms. Features include automatic E2EE of all data, sharing features, import/export functionality, multifactor authentication, and [more](https://tuta.com/calendar-app-comparison).
Multiple calendars and extended sharing functionality are limited to paid subscribers.
[:octicons-home-16: Homepage](https://tuta.com/calendar){ .md-button .md-button--primary }
[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://tuta.com/support){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" }
[:octicons-heart-16:](https://tuta.com/community#donate){ .card-link title="Contribute" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.calendar)
- [:simple-appstore: App Store](https://apps.apple.com/app/id6657977811)
- [:simple-github: GitHub](https://github.com/tutao/tutanota/releases?q=Calendar)
- [:fontawesome-brands-windows: Windows](https://tuta.com/blog/desktop-clients)
- [:simple-apple: macOS](https://tuta.com/blog/desktop-clients)
- [:simple-linux: Linux](https://tuta.com/blog/desktop-clients)
- [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota)
- [:octicons-browser-16: Web](https://app.tuta.com)
</details>
</div>
## Proton Calendar
<div class="admonition recommendation" markdown>
![Proton](assets/img/calendar/proton-calendar.svg){ align=right }
**Proton Calendar** is an encrypted calendar service available to Proton members via its web or mobile clients. Features include automatic E2EE of all data, sharing features, import/export functionality, and [more](https://proton.me/support/proton-calendar-guide).
Those on the free tier have access to 3 calendars, whereas paid subscribers can create up to 25 calendars. Extended sharing functionality is also limited to paid subscribers.
[:octicons-home-16: Homepage](https://proton.me/calendar){ .md-button .md-button--primary }
[:octicons-eye-16:](https://proton.me/calendar/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://proton.me/support/calendar){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/orgs/ProtonMail/repositories?q=calendar){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943)
- [:octicons-browser-16: Web](https://calendar.proton.me)
</details>
</div>
In 2021, Securitum [audited](https://proton.me/community/open-source#:~:text=Proton%20Calendar) Proton Calendar's web client and provided a [letter of attestation](https://res.cloudinary.com/dbulfrlrz/images/v1714639870/wp-pme/letter-of-attestation-proton-calendar-20211109_3138998f9b/letter-of-attestation-proton-calendar-20211109_3138998f9b.pdf) for the Android app.
## Criteria
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
### Minimum Qualifications
- Must sync and store information with E2EE to ensure data is not visible to the service provider.
### Best-Case
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
- Should integrate with native OS calendar and contact management apps if applicable.
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867"><defs><linearGradient id="SVGID_00000094620430057427565900000015311327790582914980_" x1="796.82" x2="203.77" y1="249.42" y2="1067.3" gradientTransform="matrix(.035694 0 0 -.035694 5.0337e-7 30.979)" gradientUnits="userSpaceOnUse"><stop offset="0" stop-color="#C8E8FF"/><stop offset=".307" stop-color="#BDAEFF"/><stop offset="1" stop-color="#6D4AFF"/></linearGradient><radialGradient id="SVGID_1_" cx="169.05" cy="788.91" r="1" gradientTransform="matrix(-16.88 45.338 60.416 22.494 -44786 -25421)" gradientUnits="userSpaceOnUse"><stop offset=".556" stop-color="#54B7FF" stop-opacity="0"/><stop offset=".994" stop-color="#54B7FF"/></radialGradient></defs><g stroke-width=".036"><path fill="#6851f6" d="m5.0337e-7 6.425c0-1.9346 1.567-3.5016 3.5016-3.5016h26.853c1.9346 0 3.5016 1.567 3.5016 3.5016v21.017c0 1.9346-1.567 3.5016-3.5016 3.5016h-26.853c-1.9346 0-3.5016-1.567-3.5016-3.5016z" class="st0"/><path fill="url(#SVGID_1_)" d="m0.0071394 6.425c0-1.9346 1.5705-3.5016 3.5052-3.5016h26.853c1.9346 0 3.5016 1.567 3.5016 3.5016v21.017c0 1.9346-1.567 3.5016-3.5016 3.5016h-26.853c-1.9346 0-3.5016-1.567-3.5016-3.5016v-21.017z" class="st1"/><path fill="#bfd8ff" d="m15.373 29.312c0-0.83168 0.29626-1.6384 0.83524-2.2702l6.168-7.2388 0.19632 11.14h-7.1995z" class="st2"/><path fill="url(#SVGID_00000094620430057427565900000015311327790582914980_)" fill-rule="evenodd" d="m3.5016 2.9234c-1.9346 0-3.5016 1.567-3.5016 3.5016v0.68176h23.933c1.5063 0 2.7235 1.2207 2.7235 2.7235v13.914h7.1995v-17.319c0-1.9346-1.567-3.5016-3.5016-3.5016z" clip-rule="evenodd"/><path fill="#fff" d="m21.406 22.38c0-2.1488 1.7419-3.8907 3.8907-3.8907h8.563v12.454h-12.454z" class="st4"/><path fill="#6d4aff" d="m24.811 26.496h1.2315c0.04997 0.21416 0.1749 0.40334 0.35337 0.53541 0.1749 0.13207 0.39264 0.19989 0.61394 0.18918 0.55683 0 0.92448-0.30697 0.92448-0.75672s-0.38193-0.69961-1.1386-0.69961h-0.48901v-1.0137h0.42476c0.73173 0 1.0316-0.26771 1.0316-0.67462 0-0.40334-0.32482-0.68176-0.77456-0.68176-0.19989-0.01071-0.39978 0.05354-0.54969 0.18561-0.15348 0.13207-0.24629 0.31768-0.26414 0.51757h-1.1886c0.04283-0.70674 0.59966-1.7205 1.9953-1.7205 1.1208 0 1.8954 0.63893 1.8954 1.5384 0 0.28912-0.08924 0.57111-0.26057 0.80312-0.17133 0.23201-0.41048 0.40691-0.68533 0.49258v0.01785c0.32125 0.05711 0.61037 0.22844 0.81383 0.48187 0.20346 0.25343 0.31054 0.57111 0.29983 0.89949 0 0.97445-0.89236 1.6169-2.0453 1.6169-1.2243 0.0071-2.0988-0.6889-2.1881-1.7312z" class="st5"/><path fill="#6d4aff" d="m31.197 22.473h0.89592v5.6718h-1.1565v-4.3511l-1.1137 0.75672v-1.1458z" class="st5"/></g></svg>

Before

Width:  |  Height:  |  Size: 2.6 KiB

-1
View File
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" viewBox="0 0 128 128"><defs><clipPath id="b"><use width="1280" height="800" overflow="visible" xlink:href="#a"/></clipPath><path id="a" d="m155.5 222.8c-12.64 0-22.875 10.246-22.875 22.872v211.23c0 0.801 0.046 1.608 0.123 2.388 8.5-3.167 17.524-6.629 27.054-10.436 66.336-26.48 120.57-48.994 120.62-74.415 0-0.814-0.056-1.636-0.172-2.458-3.43-25.098-63.407-32.879-63.324-44.381 7e-3 -0.611 0.18-1.25 0.548-1.889 7.205-12.619 35.743-12.015 46.253-12.907 10.519-0.913 35.206-0.724 36.399-8.244 0.035-0.232 0.057-0.463 0.057-0.695 0.028-6.987-16.977-9.726-16.977-9.726s20.635 3.083 20.579 11.11c0 0.393-0.048 0.8-0.158 1.214-2.222 8.624-20.379 10.246-32.386 10.835-11.356 0.569-28.648 1.861-28.707 7.408-7e-3 0.323 0.049 0.66 0.165 1.004 2.71 8.11 66.09 12.015 106.64 33.061 23.335 12.099 34.94 32.422 40.263 53.418v-166.52c0-12.626-10.243-22.872-22.869-22.872h-211.23z"/></defs><g fill="#a01e20" transform="matrix(1.3678 0 0 1.3678 -181.41 -476.68)"><clipPath><use width="1280" height="800" overflow="visible" xlink:href="#a"/></clipPath><path d="m132.63 222.8h256.98v236.49h-256.98z" clip-path="url(#b)" transform="matrix(.36416 0 0 .36416 84.331 271.09)"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.2 KiB

-274
View File
@@ -1,274 +0,0 @@
---
title: "Desktop/PC"
icon: simple/linux
description: Linux distributions are commonly recommended for privacy protection and software freedom.
cover: desktop.webp
---
<small>Protects against the following threat(s):</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
- [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md)
## Traditional Distributions
### Fedora Linux
<div class="admonition recommendation" markdown>
![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right }
**Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general.
[:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary }
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" }
[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
</details>
</div>
Fedora comes in two primary desktop editions, [Fedora Workstation](https://fedoraproject.org/workstation), which uses the GNOME desktop environment, and [Fedora KDE Plasma Desktop](https://fedoraproject.org/kde), which uses KDE. Historically, Fedora Workstation has been more popular and widely recommended, but KDE has been gaining in popularity and provides an experience more similar to Windows, which may make transitioning to Linux easier for some. The security and privacy benefits of both editions are very similar, so it mostly comes down to personal preference.
Fedora has a semi-rolling release cycle. While some packages like the desktop environment are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months.
### openSUSE Tumbleweed
<div class="admonition recommendation" markdown>
![openSUSE Tumbleweed logo](assets/img/linux-desktop/opensuse-tumbleweed.svg){ align=right }
**openSUSE Tumbleweed** is a stable rolling release distribution.
openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem.
[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary }
[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" }
[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
</details>
</div>
Tumbleweed follows a rolling release model where each update is released as a snapshot of the distribution. When you upgrade your system, a new snapshot is downloaded. Each snapshot is run through a series of automated tests by [openQA](https://openqa.opensuse.org) to ensure its quality.
### Arch Linux
<div class="admonition recommendation" markdown>
![Arch logo](assets/img/linux-desktop/archlinux.svg){ align=right }
**Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions).
[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary }
[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" }
[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
</details>
</div>
Arch Linux has a rolling release cycle. There is no fixed release schedule and packages are updated very frequently.
Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier.
A large portion of [Arch Linuxs packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1].
## Atomic Distributions
**Atomic distributions** (sometimes also referred to as **immutable distributions**) are operating systems which handle package installation and updates by layering changes atop your core system image, rather than by directly modifying the system. Advantages of atomic distros include increased stability and the ability to easily roll back updates. See [*Traditional vs. Atomic Updates*](os/linux-overview.md#traditional-vs-atomic-updates) for more info.
### Fedora Atomic Desktops
<div class="admonition recommendation" markdown>
![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right }
**Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream.
[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary }
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" }
[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
</details>
</div>
[Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer. As with the recommendation to avoid X11 in our [criteria](#criteria) for Linux distributions, we recommend avoiding flavors that support only the legacy X11 window system.
These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://coreos.github.io/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image.
After the update is complete, you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily roll back if something breaks in the new deployment. There is also the option to pin more deployments as needed.
[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside a container on top of the base image.
As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers which mimic a traditional Fedora environment, a [useful feature](https://containertoolbx.org) for the discerning developer. These containers share a home directory with the host operating system.
### NixOS
<div class="admonition recommendation" markdown>
![NixOS logo](assets/img/linux-desktop/nixos.svg){ align=right }
NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability.
[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary }
[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" }
[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
</details>
</div>
NixOSs package manager keeps every version of every package in a different folder in the **Nix store**. Due to this you can have different versions of the same package installed on your system. After the package contents have been written to the folder, the folder is made read-only.
NixOS also provides atomic updates. It first downloads (or builds) the packages and files for the new system generation and then switches to it. There are different ways to switch to a new generation: you can tell NixOS to activate it after reboot, or you can switch to it at runtime. You can also *test* the new generation by switching to it at runtime, but not setting it as the current system generation. If something in the update process breaks, you can just reboot and automatically and return to a working version of your system.
The Nix package manager uses a purely functional language—which is also called Nix—to define packages.
[Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config.
Nix is a source-based package manager; if theres no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1].
## Anonymity-Focused Distributions
### Whonix
<div class="admonition recommendation" markdown>
![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right }
**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os).
[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary }
[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" }
[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" }
[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
</details>
</div>
Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden.
Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/roddhjav/apparmor.d) and a [sandboxed app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system.
Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP.
### Tails
<div class="admonition recommendation" markdown>
![Tails logo](assets/img/linux-desktop/tails.svg){ align=right }
**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off.
[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary }
[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" }
[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
</details>
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time.
</div>
Tails is great for counter forensics due to amnesia (meaning nothing is written to the disk); however, it is not a hardened distribution like Whonix. It lacks many anonymity and security features that Whonix has and gets updated much less often (only once every six weeks). A Tails system that is compromised by malware may potentially bypass the transparent proxy, allowing for the user to be deanonymized.
Tails includes [uBlock Origin](browser-extensions.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device.
By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots.
## Security-focused Distributions
<small>Protects against the following threat(s):</small>
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
### Qubes OS
<div class="admonition recommendation" markdown>
![Qubes OS logo](assets/img/qubes/qubes_os.svg){ align=right }
**Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers.
[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary }
[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" }
[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" }
[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
</details>
</div>
Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }, the extra isolation is likely to protect the rest of the *qubes* and the core system.
For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page.
### Secureblue
<div class="admonition recommendation" markdown>
![Secureblue logo](assets/img/linux-desktop/secureblue.svg){ align=right }
**Secureblue** is a security-focused operating system based on [Fedora Atomic Desktops](#fedora-atomic-desktops). It includes a number of [security features](https://secureblue.dev/features) intended to proactively defend against the exploitation of both known and unknown vulnerabilities, and ships with [Trivalent](https://github.com/secureblue/Trivalent), their hardened, Chromium-based web browser.
[:octicons-home-16: Homepage](https://secureblue.dev){ .md-button .md-button--primary }
[:octicons-info-16:](https://secureblue.dev/install){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/secureblue/secureblue){ .card-link title="Source Code" }
[:octicons-heart-16:](https://secureblue.dev/donate){ .card-link title="Contribute" }
</div>
**Trivalent** is Secureblue's hardened Chromium for desktop Linux inspired by [GrapheneOS](android/distributions.md#grapheneos)'s Vanadium browser.
Secureblue also provides GrapheneOS's [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc) and enables it globally (including for Flatpaks).
### Kicksecure
While we [recommend against](os/linux-overview.md#release-cycle) "perpetually outdated" distributions like Debian for desktop use in most cases, Kicksecure is a Debian-based operating system which has been hardened to be much more than a typical Linux install.
<div class="admonition recommendation" markdown>
![Kicksecure logo](assets/img/linux-desktop/kicksecure.svg){ align=right }
**Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix).
[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" }
[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
</details>
</div>
## Criteria
Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards:
- Free and open source.
- Receives regular software and kernel updates.
- Avoids X11, as its last major release was [more than a decade](https://x.org/wiki/Releases) ago.
- The notable exception here is Qubes, but the [isolation issues](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation) which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines); apps running in the *same* qube are not protected from each other.
- Supports full-disk encryption during installation.
- Doesn't freeze regular releases for more than 1 year.
- We [recommend against](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage.
- Supports a wide variety of hardware.
- Preference towards larger projects.
- Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers.
In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.**
[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations){ .pg-viridian }.
@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="matrix(.73138 0 0 .73138 10.776 17.764)" fill="#1793d1"><path d="m7.2435-23.121c-1.9571 4.7983-3.1375 7.9369-5.3165 12.593 1.336 1.4161 2.9758 3.0653 5.6389 4.9279-2.8631-1.1781-4.8161-2.361-6.2756-3.5884-2.7887 5.819-7.1577 14.108-16.024 30.038 6.9685-4.023 12.37-6.5033 17.405-7.4497-0.21617-0.92976-0.33908-1.9355-0.33073-2.9848l0.0083-0.22324c0.11057-4.4645 2.433-7.8978 5.1842-7.6646 2.7512 0.23311 4.8896 4.0435 4.779 8.508-0.0208 0.84008-0.11556 1.6482-0.28112 2.3978 4.9796 0.9741 10.324 3.448 17.198 7.4166-1.3555-2.4955-2.5653-4.745-3.7207-6.8874-1.8199-1.4106-3.7182-3.2464-7.5902-5.2338 2.6614 0.69155 4.567 1.4894 6.0523 2.3812-11.747-21.871-12.698-24.777-16.727-34.23z" fill-rule="evenodd"/><g transform="matrix(.23141 0 0 .23141 -26.057 -55.67)"><path d="m239.84 313.7v-5.2094h-1.946v-0.697h4.6816v0.697h-1.954v5.2094h-0.78162"/><path d="m243.39 313.7v-5.9064h1.1765l1.398 4.182c0.12892 0.38947 0.22293 0.6809 0.28202 0.87429 0.0671-0.21488 0.1719-0.53048 0.31426-0.94681l1.4142-4.1095h1.0516v5.9064h-0.75341v-4.9435l-1.7163 4.9435h-0.70506l-1.7083-5.0281v5.0281h-0.75342"/></g></g></svg>

Before

Width:  |  Height:  |  Size: 1.2 KiB

@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867"><g><path fill="#51a2da" d="m16.934 5.2318e-4c-9.3485 0-16.927 7.5743-16.933 16.921h-0.0010517v13.104h0.0010517c0.0042067 2.1219 1.7257 3.8404 3.8486 3.8404h0.018817 13.071c9.3496-0.0053 16.927-7.5836 16.927-16.932 0-9.3528-7.5807-16.933-16.933-16.933z"/><path fill="#fafafa" d="m20.366 6.9672c-2.6408 0-4.9731 1.9886-5.2961 4.5973-0.02173 0.21836-0.03207 0.37657-0.03313 0.57453-0.0114 3.5235 0.02279 7.2698 0.0011 10.662 0 2.0456-1.5277 3.4379-3.4408 3.4379-1.9162 0-3.4607-1.5301-3.4607-3.4411 0.032068-2.0972 1.7061-3.4254 3.6645-3.4832h0.01776l1.9822-0.01668v-2.8188l-1.9833 0.01352c-3.5632-0.03313-6.3975 2.7568-6.5008 6.3052 0 3.4493 2.8385 6.2639 6.2793 6.2639 3.2463 0 5.948-2.5393 6.243-5.7132 0.04267-1.0807 0.02279-2.503 0.02279-2.503 0.0053-0.58698-0.0114-0.37472-5e-3 -1.5402l2.4637-0.01668c1.9078 0.01457 1.8892-2.8612-0.01882-2.8218l-2.4449 0.01645c0-1.4461 0.02279-2.8862 0-4.3352 0.0032-1.2527 1.1925-2.3583 2.5093-2.3583 1.3176 0 2.7099 0.65854 2.7099 2.3612 0 0.24327-0.0061 0.38426-0.01961 0.47436-0.14708 0.78971 0.39327 1.5423 1.1883 1.6563 0.79501 0.11263 1.5238-0.45978 1.6025-1.2588 0.04558-0.31588 0.0477-0.59334 0.0477-0.87186 0-3.003-2.6853-5.184-5.5288-5.184z"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.3 KiB

File diff suppressed because one or more lines are too long

Before

Width:  |  Height:  |  Size: 6.9 KiB

-1
View File
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867"><defs><linearGradient id="linearGradient4328" x1="200.6" x2="290.09" y1="351.41" y2="506.19" gradientTransform="translate(70.65 -1055.2)" gradientUnits="userSpaceOnUse"><stop offset="0" stop-color="#699ad7"/><stop offset=".243" stop-color="#7eb1dd"/><stop offset="1" stop-color="#7ebae4"/></linearGradient><linearGradient id="linearGradient4330" x1="-584.2" x2="-496.3" y1="782.34" y2="937.71" gradientTransform="translate(864.7 -1491.3)" gradientUnits="userSpaceOnUse"><stop offset="0" stop-color="#415e9a"/><stop offset=".232" stop-color="#4a6baf"/><stop offset="1" stop-color="#5277c3"/></linearGradient></defs><g transform="matrix(.067518 0 0 .067518 -10.566 65.26)"><path id="path3336-6" fill="url(#linearGradient4328)" fill-rule="evenodd" d="m309.55-710.39 122.2 211.68-56.157 0.5268-32.624-56.869-32.856 56.565-27.902-0.011-14.291-24.69 46.81-80.49-33.229-57.826z"/><use width="100%" height="100%" transform="rotate(60 407.11 -715.79)" xlink:href="#path3336-6"/><use width="100%" height="100%" transform="rotate(-60 407.31 -715.7)" xlink:href="#path3336-6"/><use width="100%" height="100%" transform="rotate(180 407.42 -715.76)" xlink:href="#path3336-6"/><path id="path4260-0" fill="url(#linearGradient4330)" fill-rule="evenodd" d="m309.55-710.39 122.2 211.68-56.157 0.5268-32.624-56.869-32.856 56.565-27.902-0.011-14.291-24.69 46.81-80.49-33.229-57.826z" color="#000" color-rendering="auto" image-rendering="auto" shape-rendering="auto" solid-color="#000000" style="isolation:auto;mix-blend-mode:normal"/><use width="100%" height="100%" transform="rotate(120 407.34 -716.08)" xlink:href="#path4260-0"/><use width="100%" height="100%" transform="rotate(240 407.29 -715.87)" xlink:href="#path4260-0"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.8 KiB

@@ -1,5 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<!-- Created with Inkscape (http://www.inkscape.org/) -->
<svg width="128" height="128" version="1.1" viewBox="0 0 128 128" xmlns="http://www.w3.org/2000/svg">
<path transform="matrix(-.87465 0 0 .87465 120.75 8.0741)" d="m94.992-0.066849c18.715-0.044873 33.956 15.196 33.911 33.911-0.04486 18.715-15.321 33.989-34.036 34.034l-8.4141 0.020097 0.017864-0.002233c-6e-3 1.4e-5 -0.007498-1.3e-5 -0.013398 0h-0.002233c-7.6468 0.017388-14.32 0.032773-17.572 0.040195-0.009725 4.4623-0.040839 18.807-0.058059 25.984-0.044878 18.715-15.319 33.991-34.034 34.036-18.715 0.04487-33.956-15.196-33.911-33.911 0.044867-18.715 15.321-33.989 34.036-34.034 2.1936-0.00527 4.5166-0.010064 7.9407-0.017864 7.7782-0.017708 14.744-0.032937 18.041-0.040195 0.009726-4.4623 0.040848-18.807 0.058059-25.984 0.04487-18.715 15.321-33.991 34.036-34.036zm0.020097 8.0055c-1.103 0.0026456-2.187 0.081744-3.2535 0.2166v28.826h28.936c0.12707-1.0356 0.20064-2.0878 0.20321-3.1575 0.0345-14.39-11.496-25.92-25.885-25.885zm-11.259 2.5702c-8.739 4.2031-14.767 13.124-14.792 23.478-0.01718 7.1648-0.048059 21.454-0.058059 25.946 4.4917-0.0099 18.779-0.040849 25.943-0.058059 10.391-0.024925 19.338-6.0976 23.523-14.888h-34.617v-34.478zm-22.873 57.447c-4.4931 0.00995-18.781 0.040851-25.946 0.058059-10.529 0.025256-19.571 6.2614-23.681 15.241h34.474v34.264c8.9016-4.1421 15.07-13.146 15.095-23.619 0.01719-7.1648 0.048059-21.452 0.058059-25.943zm-23.157 23.3h-28.679c-0.10066 0.92285-0.15627 1.8597-0.15855 2.8092-0.034516 14.39 11.496 25.92 25.885 25.885 0.99889-0.00239 1.9828-0.06749 2.9521-0.17864v-28.516z" color="#000000" fill="#35b9ab" fill-rule="evenodd" stroke-linecap="square" style="-inkscape-stroke:none"/>
</svg>

Before

Width:  |  Height:  |  Size: 1.7 KiB

@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="matrix(.52917 0 0 .52917 .0016651 -523.01)"><g transform="matrix(.40296 0 0 .40296 360.66 978.2)"><path d="m-816.29 25.214a15.882 15.918 0 0 0-8.3171 2.135l-53.648 31.034a15.882 15.918 0 0 0-7.9452 13.784v62.1a15.882 15.918 0 0 0 7.9452 13.768l53.648 31.058a15.882 15.918 0 0 0 15.882 0l53.656-31.058a15.882 15.918 0 0 0 7.9371-13.768v-62.1a15.882 15.918 0 0 0-7.9371-13.784l-53.656-31.034a15.882 15.918 0 0 0-7.5652-2.135zm-0.17228 35.101a8.7349 8.755 0 0 1 4.1636 1.169l29.512 17.071a8.7349 8.755 0 0 1 4.3663 7.582v34.159a8.7349 8.755 0 0 1-4.3663 7.5656l-29.512 17.088a8.7349 8.755 0 0 1-8.7305 0l-29.513-17.088a8.7349 8.755 0 0 1-4.3653-7.5656v-34.159a8.7349 8.755 0 0 1 4.3653-7.582l29.513-17.071a8.7349 8.755 0 0 1 4.5669-1.169z" fill="#63a0ff"/><path d="m-749.26 64.233-30.34 17.551a8.7349 8.755 0 0 1 1.1738 4.375v34.15a8.7349 8.755 0 0 1-4.3652 7.5742l-29.504 17.08a8.7349 8.755 0 0 1-4.3496 1.1602v35.102a15.882 15.918 0 0 0 7.9219-2.1191l11.936-6.9082 15.23 8.8633c6.8122 3.9643 17.78 3.9643 24.592 0l6.8106-3.9629c6.8122-3.9643 6.8122-10.348 0-14.312l-15.146-8.8144 10.234-5.9238a15.882 15.918 0 0 0 7.9375-13.768v-62.092a15.882 15.918 0 0 0-2.1309-7.9551z" fill="#3874d8"/><path d="m-884.06 64.207 30.334 17.56a8.7349 8.755 0 0 1 3.1929-3.2071l29.508-17.075a8.7349 8.755 0 0 1 8.7265 3e-3l29.51 17.071a8.7349 8.755 0 0 1 3.1777 3.1948l30.328-17.55a15.882 15.918 0 0 0-5.791-5.8162l-53.664-31.045a15.882 15.918 0 0 0-15.864-5e-3l-53.649 31.046a15.882 15.918 0 0 0-5.8092 5.8265z" fill="#99bfff"/></g></g></svg>

Before

Width:  |  Height:  |  Size: 1.6 KiB

@@ -1,97 +0,0 @@
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!-- Created with Inkscape (http://www.inkscape.org/) -->
<svg
width="448"
height="448"
viewBox="0 0 448 448"
version="1.1"
id="svg1"
xml:space="preserve"
xmlns:xlink="http://www.w3.org/1999/xlink"
xmlns="http://www.w3.org/2000/svg"
xmlns:svg="http://www.w3.org/2000/svg"><defs
id="defs1"><linearGradient
id="linearGradient10"
x1="119.00664"
y1="9.9706745"
x2="9.8707094"
y2="118.384"
gradientUnits="userSpaceOnUse"
gradientTransform="matrix(1.1666666,0,0,1.1666666,-10.666666,-10.666666)"
spreadMethod="pad"><stop
stop-color="#76C9F6"
id="stop6"
offset="0"
style="stop-color:#3dc7f5;stop-opacity:1;" /><stop
stop-color="#76C9F6"
id="stop7"
offset="0.25"
style="stop-color:#0da6f2;stop-opacity:1;" /><stop
stop-color="#76C9F6"
id="stop8"
offset="0.5"
style="stop-color:#5f82c9;stop-opacity:1;" /><stop
stop-color="#76C9F6"
id="stop9"
offset="0.75"
style="stop-color:#7259a6;stop-opacity:1;" /><stop
offset="1"
stop-color="#715680"
id="stop10"
style="stop-color:#744e74;stop-opacity:1;" /></linearGradient><linearGradient
xlink:href="#linearGradient10"
id="linearGradient6"
x1="367.99997"
y1="62.010296"
x2="143.99998"
y2="449.98965"
gradientUnits="userSpaceOnUse"
gradientTransform="matrix(1,0,0,0.97816594,-32,-31.30131)" /><filter
style="color-interpolation-filters:sRGB"
id="filter40"
x="-0.024489796"
y="-0.01875"
width="1.0693878"
height="1.0609375"><feFlood
result="flood"
in="SourceGraphic"
flood-opacity="0.75"
flood-color="rgb(64,0,128)"
id="feFlood39" /><feGaussianBlur
result="blur"
in="SourceGraphic"
stdDeviation="2.000000"
id="feGaussianBlur39" /><feOffset
result="offset"
in="blur"
dx="4.000000"
dy="6.000000"
id="feOffset39" /><feComposite
result="comp1"
operator="in"
in="flood"
in2="offset"
id="feComposite39" /><feComposite
result="comp2"
operator="over"
in="SourceGraphic"
in2="comp1"
id="feComposite40" /></filter></defs><path
id="rect32-2"
style="display:inline;fill:#7a4f7b;fill-opacity:1;stroke-width:1.33345"
d="M 10.226928,212.286 C 10.164833,214.49216 0,220.55304 0,222.77506 0,347.54967 98.566,448 221,448 h 6 c 122.434,0 221,-100.45033 221,-225.22494 0,-2.22202 -16.24004,-3.47394 -16.30213,-5.6801 C 428.27178,340.46667 345.91556,421.48738 224,421.48738 102.08444,421.48738 13.653019,335.65771 10.226928,212.286 Z" /><rect
style="opacity:1;fill:url(#linearGradient6);fill-opacity:1;stroke-width:1.1203;stroke-linecap:round;stroke-linejoin:round"
id="rect4"
width="448"
height="438.21835"
x="0"
y="0"
ry="219.10918" /><g
id="g10"
style="filter:url(#filter40)"
transform="matrix(1,0,0,0.97816594,-32,-31.30131)"><path
d="m 184.50002,383.99994 c -6.73728,0 -12.50712,-2.38932 -17.30912,-7.168 -4.802,-4.77864 -7.19881,-10.51631 -7.19088,-17.21292 V 237.71429 c 0,-6.70501 2.40101,-12.44637 7.203,-17.22505 4.802,-4.77865 10.56768,-7.16426 17.297,-7.15592 h 12.25001 V 188.9524 c 0,-16.86372 5.97379,-31.24014 17.92183,-43.1297 11.9476,-11.89 26.39048,-17.83059 43.32816,-17.82269 16.94556,0 31.39264,5.94478 43.34023,17.83478 11.94808,11.88954 17.9177,26.26222 17.90972,43.11761 v 24.38092 h 12.25001 c 6.73727,0 12.50712,2.38935 17.30912,7.16798 4.802,4.77869 7.19881,10.51635 7.19088,17.21299 v 121.90473 c 0,6.70451 -2.40101,12.44636 -7.20301,17.22503 -4.802,4.77864 -10.56768,7.16378 -17.29699,7.15593 z m 73.5,-60.95235 c 6.73724,0 12.50711,-2.38932 17.30911,-7.168 4.80201,-4.77869 7.19881,-10.51631 7.19086,-17.21297 0,-6.70498 -2.40101,-12.44632 -7.20301,-17.22499 -4.802,-4.77869 -10.56765,-7.1643 -17.29696,-7.15593 -6.73777,0 -12.50715,2.38933 -17.30916,7.16801 -4.802,4.77867 -7.1988,10.5163 -7.19085,17.21291 0,6.70454 2.40101,12.44636 7.20301,17.22505 4.802,4.77867 10.56763,7.1638 17.297,7.15592 z m -36.75,-109.71427 h 73.49995 V 188.9524 c 0,-10.15874 -3.57279,-18.79377 -10.71883,-25.90466 -7.1456,-7.11136 -15.8228,-10.66679 -26.03112,-10.66679 -10.20836,0 -18.88556,3.55543 -26.03117,10.66679 -7.14603,7.11089 -10.71883,15.74592 -10.71883,25.90466 z"
fill="#f4f5ff"
id="path2"
style="display:inline;fill:#e5e5ff;fill-opacity:1;stroke-width:4.65526" /></g></svg>

Before

Width:  |  Height:  |  Size: 4.6 KiB

-1
View File
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" width="128" height="128" version="1.1" viewBox="0 0 33.866 33.866"><path fill="#56347c" stroke-width=".227" d="m-5.6458e-7 -5.6458e-7h33.866v33.866h-33.866z"/><g fill="#fff" transform="matrix(.28966 0 0 .28966 2.6903 -.51532)"><path d="m88.342 56.73v16.663c0 0.51029-0.34108 0.64398-0.76069 0.29659l-8.5041-7.0404c-0.41921-0.34706-0.76028-1.0401-0.76028-1.5504v-2.0977l-2.6577-2.1608c-2.8502-2.3173-5.1324-7.0217-5.1324-10.465 0-3.4423 2.2978-4.3394 5.1324-2.0027l2.6577 2.1608v-2.0977c0-0.51005 0.34107-0.64374 0.76028-0.29668l8.5039 7.0402c0.42055 0.34644 0.76089 1.0406 0.76089 1.5507zm-12.531-5.2978c-1.5002-1.2367-2.7163-0.76168-2.7163 1.0602 0 1.8224 1.2161 4.3019 2.7163 5.5386l2.5057 2.0355v-6.599l-2.5057-2.0355z"/><g><path fill="#fff" d="m97.976 37.8c-4e-3 -0.021-8e-3 -0.042-0.013-0.063-0.016-0.068-0.036-0.135-0.062-0.199-3e-3 -8e-3 -5e-3 -0.016-8e-3 -0.023-0.03-0.069-0.067-0.135-0.107-0.198-0.011-0.018-0.024-0.034-0.036-0.051-0.035-0.05-0.074-0.097-0.116-0.141-0.011-0.012-0.021-0.024-0.033-0.036-0.053-0.052-0.111-0.1-0.173-0.143-0.015-0.011-0.032-0.019-0.048-0.029-0.031-0.019-0.06-0.04-0.092-0.057l-0.545-0.284-24.906 11.12-46.585-23.427-0.666 0.33c-6e-3 3e-3 -0.01 7e-3 -0.016 0.01-0.047 0.024-0.09 0.055-0.134 0.084-0.029 0.019-0.06 0.036-0.087 0.057-0.034 0.027-0.063 0.059-0.094 0.09-0.031 0.03-0.065 0.059-0.093 0.092-0.022 0.026-0.039 0.056-0.06 0.084-0.031 0.043-0.063 0.086-0.088 0.132-3e-3 5e-3 -7e-3 0.01-0.01 0.015-0.015 0.028-0.022 0.057-0.035 0.085-0.02 0.046-0.041 0.09-0.056 0.138-0.013 0.041-0.02 0.082-0.029 0.123-9e-3 0.043-0.019 0.085-0.024 0.128s-4e-3 0.085-5e-3 0.127c-1e-3 0.044-3e-3 0.087 1e-3 0.13 2e-3 0.023 5e-3 0.046 9e-3 0.069-6e-3 0.051-0.015 0.1-0.015 0.152l4e-3 15.559 3.3631-1.5666 36.405 18.104-25.084 11.136-18.939-9.469-16.99-8.4933c-0.012-6e-3 -0.025-9e-3 -0.038-0.014-0.042-0.02-0.086-0.035-0.131-0.05-0.04-0.014-0.08-0.028-0.121-0.038-0.038-9e-3 -0.078-0.014-0.117-0.019-0.049-7e-3 -0.098-0.014-0.148-0.015-0.013 0-0.024-4e-3 -0.037-4e-3 -0.025 0-0.049 6e-3 -0.074 7e-3 -0.05 4e-3 -0.099 7e-3 -0.148 0.016-0.04 7e-3 -0.079 0.017-0.118 0.027-0.043 0.011-0.085 0.024-0.127 0.039-0.039 0.015-0.077 0.032-0.114 0.051-0.039 0.019-0.077 0.039-0.115 0.062-0.035 0.022-0.068 0.045-0.1 0.07-0.035 0.027-0.07 0.054-0.103 0.085-0.031 0.029-0.059 0.059-0.087 0.09-0.028 0.032-0.056 0.064-0.082 0.099-0.028 0.038-0.052 0.079-0.076 0.12-0.013 0.023-0.03 0.042-0.042 0.066-6e-3 0.012-8e-3 0.025-0.014 0.037-0.02 0.043-0.036 0.089-0.051 0.135-0.013 0.039-0.027 0.078-0.036 0.117-9e-3 0.04-0.014 0.081-0.02 0.122-7e-3 0.048-0.013 0.095-0.014 0.142 1e-3 0.014-3e-3 0.026-3e-3 0.039v19.531c0 0.026 6e-3 0.051 8e-3 0.077 3e-3 0.048 6e-3 0.096 0.014 0.143 7e-3 0.042 0.017 0.082 0.028 0.122 0.011 0.042 0.023 0.083 0.038 0.123s0.033 0.079 0.052 0.117 0.038 0.076 0.061 0.112c0.022 0.035 0.046 0.069 0.071 0.102 0.027 0.035 0.054 0.069 0.084 0.102 0.028 0.031 0.059 0.059 0.09 0.087 0.032 0.029 0.064 0.056 0.1 0.082 0.038 0.027 0.077 0.051 0.118 0.075 0.023 0.014 0.043 0.031 0.068 0.043l36.521 18.258c7e-3 4e-3 0.015 4e-3 0.022 8e-3 0.017 8e-3 0.032 0.017 0.049 0.025 0.01 4e-3 0.02 7e-3 0.03 0.011 0.056 0.022 0.113 0.041 0.171 0.055l0.036 9e-3c0.016 3e-3 0.032 5e-3 0.048 8e-3 0.077 0.014 0.154 0.024 0.232 0.024h8e-3c0.078 0 0.156-0.01 0.232-0.024 0.016-3e-3 0.032-5e-3 0.048-8e-3l0.036-9e-3c0.058-0.014 0.115-0.033 0.17-0.055 0.01-4e-3 0.021-7e-3 0.031-0.011 0.017-7e-3 0.032-0.017 0.049-0.024 7e-3 -3e-3 0.015-4e-3 0.022-8e-3l22.616-9.902 9.462 5.221c0.018 0.01 0.037 0.017 0.056 0.026 0.019 0.01 0.038 0.02 0.058 0.029 8e-3 3e-3 0.016 7e-3 0.024 0.01 0.031 0.013 0.063 0.023 0.095 0.033 0.019 6e-3 0.038 0.013 0.058 0.019 0.021 6e-3 0.043 0.011 0.064 0.015 0.015 3e-3 0.029 6e-3 0.044 8e-3 7e-3 1e-3 0.015 3e-3 0.022 4e-3 0.014 2e-3 0.028 6e-3 0.042 8e-3 0.059 8e-3 0.117 0.013 0.176 0.013h5e-3c0.078 0 0.155-0.01 0.232-0.024 0.013-2e-3 0.026-3e-3 0.039-6e-3 0.01-2e-3 0.019-6e-3 0.029-8e-3 0.07-0.017 0.14-0.037 0.207-0.065 7e-3 -3e-3 0.014-7e-3 0.021-0.01l0.012-6e-3c6e-3 -3e-3 0.012-3e-3 0.018-6e-3l24.828-11.586c0.465-0.219 0.762-0.686 0.762-1.2v-36.083c0-6e-3 -2e-3 -0.011-2e-3 -0.017-1e-3 -0.074-9e-3 -0.146-0.022-0.217zm-60.762 40.617-7.614 3.666 3.972 1.986 3.641-1.986v6.29l-33.872-16.935v-9.829l8.6776 4.2413-7.257 3.35 3.972 1.986 7.269-3.378 4.313 2.051-7.487 3.456 3.972 1.986 7.503-3.482 4.621 2.344-7.381 3.407 3.972 1.986 7.395-3.434 4.303 2.111zm28.014-1.478-25.366 11.277v-16.57l25.366-11.276zm-61.887-18.411v-3.31l33.873 16.603v3.31z" transform="matrix(.4641 .92679 -.92679 .4641 77.258 -14.893)"/></g><polygon points="33.117 56.241 39.407 53.262 45.366 56.241 39.076 59.22" transform="rotate(63.4,48.431,48.893)"/><polygon points="28.814 53.593 22.855 50.613 29.145 47.634 35.103 50.613" transform="rotate(63.4,48.415,48.413)"/><path d="m45.058 34.348c2.1244 2.7041 4.2952 7.9854 4.2952 12.866 0 4.8782-2.1708 6.542-4.2952 5.7039v-18.57z"/></g></svg>

Before

Width:  |  Height:  |  Size: 4.8 KiB

@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867"><defs><radialGradient id="a" cx="250.34" cy="1008" r="26.421" gradientTransform="matrix(.41116 -.0047432 .0056477 .48958 -91.645 -470.93)" gradientUnits="userSpaceOnUse"><stop offset="0" stop-color="#7ecff3" stop-opacity=".98"/><stop offset=".669" stop-color="#87d0ef" stop-opacity=".988"/><stop offset="1" stop-color="#0c84ce"/></radialGradient></defs><path fill="url(#a)" stroke="#000" stroke-width=".961" d="m16.607 0.48083c-4.4582 0-8.193 3.5554-8.193 8.0147v3.9246a12.214 12.214 0 0 0-3.6957 8.7517 12.214 12.214 0 0 0 12.215 12.214 12.214 12.214 0 0 0 12.214-12.214 12.214 12.214 0 0 0-3.8655-8.8946v-3.782c0-4.459-3.543-8.0147-8.0011-8.0147zm-0.052549 2.883h0.22523c2.745 0 4.8987 2.2475 4.8987 4.9926v1.5616a12.214 12.214 0 0 0-4.7449-0.96004 12.214 12.214 0 0 0-5.3473 1.2425v-1.8441c0-2.745 2.2232-4.9926 4.9682-4.9926z"/><path fill-rule="evenodd" stroke-width=".068" d="m11.235 19.445c0.06956-3.6517 1.2172-6.26 2.1214-6.26 1.1129 0 2.7126 1.5302 3.8255 1.5302 0.69551 0 2.2605-1.1128 3.4778-1.1128 0.62599 0 1.6315 1.9827 1.6662 5.3215-4.3885 0.25147-7.3042 1.9609-11.091 0.5212z"/><path fill-rule="evenodd" stroke-width=".068" d="m15.553 23.209c0.67434-0.41309 1.7756-0.38573 2.3726-0.04708l0.0098 0.49172c-0.62789-0.34413-1.7282-0.32225-2.3726 0.04708z"/><path fill="none" stroke="#000" stroke-linecap="round" stroke-linejoin="round" stroke-width=".961" d="m18.867 27.687s-0.20215 0.75907-1.895 0.81876c-1.8786 0.08812-2.1123-0.633-2.1123-0.633"/><g fill-rule="evenodd" stroke-width=".068"><path d="m7.9223 19.924c0.033252-1.3309 5.5358 1.0118 7.2348 0.79065 2.6487-0.19148 9.9331-2.4542 10.299-0.75737 0.26618 1.4973-2.0458 0.32123-6.3475 0.97582 0 0-11.187 1.2202-11.187-1.0091z"/><path d="m10.975 23.298c0.54965-0.79882 3.0422-1.045 4.8514-0.25243 0 0 0.27153 0.80753-0.07045 1.3239-0.28129 0.8521-2.8723 1.724-4.3748 0.74771-0.57042-0.47474-0.65288-1.1139-0.40604-1.8192z"/><path d="m22.473 22.743c-0.64467-0.7243-3.1485-0.6588-4.8451 0.35243 0 0-0.16906 0.83502 0.23443 1.3049 0.38502 0.81059 3.0643 1.3537 4.4338 0.19828 0.507-0.54198 0.50939-1.1865 0.17682-1.8556z"/></g></svg>

Before

Width:  |  Height:  |  Size: 2.2 KiB

@@ -1,141 +0,0 @@
---
title: "Email Aliasing"
icon: material/email-lock
description: An email aliasing service allows you to easily generate a new email address for every website you register for.
cover: email-aliasing.webp
---
<small>Protects against the following threat(s):</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information){ .pg-green }
An **email aliasing service** allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your [email provider](email.md).
Email aliasing can also act as a safeguard in case your email provider ever ceases operation. In that scenario, you can easily re-route your aliases to a new email address. In turn, however, you are placing trust in the aliasing service to continue functioning.
## Benefits
Using a service which allows you to individually manage email aliases has a number of benefits over conventional mailbox management/filtering methods:
### Over Plus Addressing
True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like `yourname+[anythinghere]@example.com`, because websites, advertisers, and tracking networks can trivially remove anything after the `+` sign. Organizations like the [IAB](https://en.wikipedia.org/wiki/Interactive_Advertising_Bureau) require that advertisers [normalize email addresses](https://shkspr.mobi/blog/2023/01/the-iab-loves-tracking-users-but-it-hates-users-tracking-them) so that they can be correlated and tracked, regardless of users' privacy wishes.
### Over Catch-All Aliases
Using a dedicated email aliasing service has a number of benefits over a catch-all alias on a custom domain:
- Aliases can be turned on and off individually when you need them, preventing websites from emailing you randomly.
- Replies are sent from the alias address, shielding your real email address.
### Over Temporary Email Services
Email aliasing services also have a number of benefits over "temporary email" services:
- Aliases are permanent and can be turned on again if you need to receive something like a password reset.
- Emails are sent to your trusted mailbox rather than stored by the alias provider.
- Temporary email services typically have public mailboxes which can be accessed by anyone who knows the address, while aliases are private to you.
## Recommended Providers
<div class="grid cards" markdown>
- ![Addy.io logo](assets/img/email-aliasing/addy.svg){ .twemoji } [Addy.io](email-aliasing.md#addyio)
- ![SimpleLogin logo](assets/img/email-aliasing/simplelogin.svg){ .twemoji } [SimpleLogin](email-aliasing.md#simplelogin)
</div>
Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as on your own custom domain(s) for a modest yearly fee. They can also be self-hosted if you want maximum control. However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the `@` symbol.
Using an aliasing service requires trusting both your email provider and your aliasing provider with your unencrypted messages. Some providers mitigate this slightly with automatic PGP encryption[^1], which reduces the number of parties you need to trust from two to one by encrypting incoming emails before they are delivered to your final mailbox provider.
### Addy.io
<div class="admonition recommendation" markdown>
![Addy.io logo](assets/img/email-aliasing/addy.svg){ align=right }
**Addy.io** lets you create 10 domain aliases on a shared domain for free, or unlimited ["standard" aliases](https://addy.io/faq/#what-is-a-standard-alias).
[:octicons-home-16: Homepage](https://addy.io){ .md-button .md-button--primary }
[:octicons-eye-16:](https://addy.io/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://addy.io/faq){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/anonaddy){ .card-link title="Source Code" }
[:octicons-heart-16:](https://addy.io/donate){ .card-link title="Contribute" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://addy.io/faq/#is-there-an-android-app)
- [:simple-appstore: App Store](https://addy.io/faq/#is-there-an-ios-app)
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/iadbdpnoknmbdeolbapdackdcogdmjpe)
</details>
</div>
The number of shared aliases (which end in a shared domain like `@addy.io`) that you can create depends on the [plan](https://addy.io/#pricing) you are subscribed to. You can pay for these plans using [cryptocurrency](https://addy.io/help/subscribing-with-cryptocurrency) or purchase a voucher code from [ProxyStore](https://addy.io/help/voucher-codes), Addy.io's official reseller.
You can create unlimited standard aliases which end in a domain like `@[username].addy.io` or a custom domain on paid plans. However, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service.
Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) Addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf).
Notable free features:
- [x] 10 Shared Aliases
- [x] Unlimited Standard Aliases
- [ ] No Outgoing Replies
- [x] 1 Recipient Mailbox
- [x] Automatic PGP Encryption[^1]
If you cancel your subscription, you will still enjoy the features of your paid plan until the billing cycle ends. After the end of your current billing cycle, most paid features (including any custom domains) will be [deactivated](https://addy.io/faq/#what-happens-if-i-have-a-subscription-but-then-cancel-it), paid account settings will be reverted to their defaults, and catch-all will be enabled if it was previously disabled.
### SimpleLogin
<div class="admonition recommendation" markdown>
![SimpleLogin logo](assets/img/email-aliasing/simplelogin.svg){ align=right }
**SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains.
[:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary }
[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858)
- [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases)
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn)
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/diacfpipniklenphgljfkmhinphjlfff)
- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
</details>
</div>
SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing.
You can link your SimpleLogin account in the settings with your Proton account. If you have Proton Pass Plus, Proton Unlimited, or any multi-user Proton plan, you will have SimpleLogin Premium for free. You can also purchase a voucher code for SimpleLogin Premium anonymously via their official reseller [ProxyStore](https://simplelogin.io/faq).
Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf).
Notable free features:
- [x] 10 Shared Aliases
- [x] Unlimited Replies
- [x] 1 Recipient Mailbox
- [ ] Automatic PGP Encryption[^1] is only available on paid plans
When your subscription ends, all aliases you created will still be able to receive and send emails. However, you cannot create any new aliases that would exceed the free plan limit, nor can you add a new domain, directory, or mailbox.
## Criteria
**Please note we are not affiliated with any of the providers we recommend.** In addition to [our standard criteria](about/criteria.md), we evaluate email aliasing providers to the same standard as our regular [email provider criteria](email.md#criteria) where applicable. We suggest you familiarize yourself with this list before choosing an email aliasing service, and conduct your own research to ensure the provider you choose is the right choice for you.
[^1]: Automatic PGP encryption allows you to encrypt non-encrypted incoming emails before they are forwarded to your mailbox, making sure your primary mailbox provider never sees unencrypted email content.
@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><defs><linearGradient id="SVGID_1_" x1="42.708" x2="130.68" y1="135.75" y2="47.776" gradientTransform="matrix(.25025 0 0 -.25025 -11.762 42.835)" gradientUnits="userSpaceOnUse"><stop stop-color="#3AE7E1" offset="0"/><stop stop-color="#1993D2" offset=".9481"/></linearGradient><linearGradient id="SVGID_00000133497581833190088830000011359831797951217313_" x1="67.759" x2="155.73" y1="160.8" y2="72.827" gradientTransform="matrix(.25025 0 0 -.25025 -11.762 42.835)" gradientUnits="userSpaceOnUse"><stop stop-color="#3AE7E1" offset="0"/><stop stop-color="#1993D2" offset=".9481"/></linearGradient><linearGradient id="SVGID_00000095339857216016244530000015244439318020201364_" x1="42.676" x2="130.65" y1="135.72" y2="47.744" gradientTransform="matrix(.25025 0 0 -.25025 -11.762 42.835)" gradientUnits="userSpaceOnUse"><stop stop-color="#3AE7E1" offset="0"/><stop stop-color="#1993D2" offset=".9481"/></linearGradient></defs><g transform="matrix(1.2083 0 0 1.2083 4.2637 -3.528)" stroke-width=".25025"><path class="st0" d="m17.492 18.685c0 1.3013-0.7007 2.4274-1.7518 3.028v2.2272c0 0.97598-0.77578 1.7518-1.7518 1.7518 1.2262 0 2.3774-0.32532 3.3784-0.87588 0.07507-0.27528 0.12512-0.57558 0.12512-0.87588z" fill="#2d7aae"/><path class="st1" d="m13.989 15.182h-6.982c-0.97598 0-1.7518 0.77578-1.7518 1.7518v7.007c0 0.97598 0.77578 1.7518 1.7518 1.7518h7.007c0.97598 0 1.7518-0.77578 1.7518-1.7518v-7.007c-0.02502-0.97598-0.8008-1.7518-1.7768-1.7518zm-1.7518 7.007h-3.4785v-3.5035h3.5035z" fill="url(#SVGID_1_)"/><path d="m7.4822 8.175c0.6006-1.051 1.7267-1.7518 3.028-1.7518s2.4274 0.7007 3.028 1.7518h0.47548c1.1762 0 2.3273 0.25025 3.4034 0.7007-0.5005-3.3534-3.4034-5.956-6.9069-5.956s-6.4064 2.5776-6.9069 5.956c1.0761-0.45045 2.2272-0.7007 3.4034-0.7007z" fill="url(#SVGID_00000133497581833190088830000011359831797951217313_)"/><path class="st0" d="m3.5032 10.878c1.026-0.6006 2.2272-0.95095 3.5035-0.95095 0-0.62562 0.17518-1.2262 0.47548-1.7518h-0.47548c-1.1762 0-2.3273 0.25025-3.4034 0.7007-0.05005 0.35035-0.075075 0.7007-0.075075 1.051v0.95095z" fill="#2d7aae"/><path class="st0" d="m13.513 8.175c0.3003 0.52552 0.47548 1.1011 0.47548 1.7518 1.2763 0 2.4775 0.35035 3.5035 0.95095v-0.95095c0-0.35035-0.02503-0.7007-0.07508-1.051-1.0761-0.45045-2.2272-0.7007-3.4034-0.7007z" fill="#2d7aae"/><path d="m17.492 23.941c0 0.3003-0.05005 0.6006-0.12512 0.87588 2.1522-1.2012 3.6036-3.4785 3.6036-6.1311v-1.7518c0-2.5776-1.4014-4.8548-3.5035-6.056-1.026-0.6006-2.2272-0.95095-3.5035-0.95095h-6.957c-1.2763 0-2.4775 0.35035-3.5035 0.95095-2.1021 1.2012-3.5035 3.4534-3.5035 6.056v7.007c0 3.8538 3.1281 7.007 7.007 7.007h7.007c0-1.9269-1.5766-3.5035-3.5035-3.5035h-3.5035c-1.9269 0-3.5035-1.5766-3.5035-3.5035v-7.007c0-1.9269 1.5766-3.5035 3.5035-3.5035h7.007c1.9269 0 3.5035 1.5766 3.5035 3.5035v1.7518z" fill="url(#SVGID_00000095339857216016244530000015244439318020201364_)"/></g></svg>

Before

Width:  |  Height:  |  Size: 2.9 KiB

@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 59"><defs><linearGradient id="a" x1="0%" x2="99.995%" y1="50%" y2="50%"><stop offset="0%" stop-color="#ED2E7C"/><stop offset="100%" stop-color="#A8288F"/></linearGradient></defs><path fill="url(#a)" fill-rule="nonzero" d="M96.523 0H25.005l-.903.933-.153.169a41.263 41.263 0 0 1-2.126 2.057A45.808 45.808 0 0 1 2.6 13.883c-.207.061-.406.107-.612.168l-.903.222-.206.903c-.077.329-.138.658-.207 1.002A38.1 38.1 0 0 0 0 23.223a37.415 37.415 0 0 0 22.343 34.244c.153.077.329.153.497.222.375.168.75.314 1.124.467l.452.168.06.015.031-.015a.26.26 0 0 0 .108.015h71.893a2.805 2.805 0 0 0 2.807-2.807V2.784A2.767 2.767 0 0 0 96.523 0Zm-4.857 4.483-29.93 26.09a1.628 1.628 0 0 1-2.143-.015l-9.76-8.651a35.554 35.554 0 0 0-.673-6.196 36.48 36.48 0 0 1-.092-.527l-.206-.903-.903-.237c-.222-.046-.436-.107-.658-.153a44.69 44.69 0 0 1-13.898-6.54l-3.235-2.86h61.498v-.008ZM51.378 29.105l-2.455 2.172c.282-1.243.502-2.499.658-3.763l1.797 1.59Zm-26.84 26.06a36.184 36.184 0 0 1-2.715-1.247 34.66 34.66 0 0 1-18.817-30.68c-.003-2.18.207-4.355.627-6.494a48.582 48.582 0 0 0 18.19-9.34A43.137 43.137 0 0 0 25.02 4.56 48.67 48.67 0 0 0 42.68 15.566a40.75 40.75 0 0 0 3.626 1.14c.138.78.268 1.575.344 2.37.144 1.28.218 2.568.222 3.856 0 .704-.015 1.407-.076 2.111a33.775 33.775 0 0 1-2.142 10.013 34.551 34.551 0 0 1-20.117 20.109Zm8.728-1.155A37.48 37.48 0 0 0 45.71 40.02l8.98-7.932 4.873 4.36c.616.543 1.54.543 2.157 0l4.964-4.406 24.92 21.937-58.338.03Zm36.807-24.92L95.008 6.93l.046 44.189-24.981-22.03ZM31.269 46.842a24.6 24.6 0 0 0 3.312-2.922l-3.312 2.922Zm11.114-25.686a31.669 31.669 0 0 0-.283-1.874 34.74 34.74 0 0 1-2.906-.933.015.015 0 0 1-.016-.015c-.252-.077-.482-.184-.734-.283a25.363 25.363 0 0 1-1.637-.72 19.24 19.24 0 0 1-1.14-.542 10.245 10.245 0 0 1-.81-.42 35.255 35.255 0 0 1-2.532-1.485 25.548 25.548 0 0 1-1.5-1.002.275.275 0 0 1-.107-.076c-.527-.36-1.047-.75-1.56-1.14a43.023 43.023 0 0 1-2.952-2.486c-.406-.36-.811-.734-1.201-1.124a54.541 54.541 0 0 1-3.182 2.845 38.333 38.333 0 0 1-14.006 7.42 27.794 27.794 0 0 0-.497 5.232A28.301 28.301 0 0 0 21.83 49.19c.905.496 1.837.94 2.792 1.33a31.993 31.993 0 0 0 1.698-.718c.452-.207.903-.42 1.346-.658.407-.203.803-.428 1.186-.673.13-.065.255-.14.375-.222.206-.122.405-.252.596-.375a.368.368 0 0 0 .123-.091c.35-.217.69-.452 1.017-.704a1.3 1.3 0 0 0 .314-.237l3.312-2.922c.03 0 .03 0 .03-.015a28.385 28.385 0 0 0 6.946-12.239 27.624 27.624 0 0 0 1.002-7.374 30.795 30.795 0 0 0-.184-3.136ZM26.26 37.205l-2.547 2.547h-.015l-10.54-10.54 3.235-3.266 7.32 7.32 2.547-2.547 8.888-8.904 3.251 3.251-12.139 12.139Z"/></svg>

Before

Width:  |  Height:  |  Size: 2.6 KiB

-374
View File
@@ -1,374 +0,0 @@
---
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: Email Services
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
cover: email.webp
global:
- [randomize-element, "table tbody"]
---
<small>Protects against the following threat(s):</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.
[Recommended Instant Messengers](real-time-communication.md){ .md-button }
## Recommended Providers
For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features. Read our [full list of criteria](#criteria) for more information.
| Provider | OpenPGP / WKD | IMAP / SMTP | Encrypted Storage | Anonymous Payment Methods |
|---|---|---|---|---|
| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | Cash <br>Monero via third party |
| [Mailbox Mail](#mailbox-mail) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash |
| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero via third party <br>Cash via third party |
In addition to (or instead of) an email provider recommended here, you may wish to consider a dedicated [email aliasing service](email-aliasing.md#recommended-providers) to protect your privacy. Among other things, these services can help protect your real inbox from spam, prevent marketers from correlating your accounts, and encrypt all incoming messages with PGP.
- [More Information :material-arrow-right-drop-circle:](email-aliasing.md)
## OpenPGP Compatible Services
These providers natively support OpenPGP encryption/decryption and the [Web Key Directory (WKD) standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic end-to-end encrypted emails. For example, a Proton Mail user could send an E2EE message to a Mailbox Mail user, or you could receive OpenPGP-encrypted notifications from internet services which support it.
<div class="grid cards" markdown>
- ![Proton Mail logo](assets/img/email/protonmail.svg){ .twemoji } [Proton Mail](#proton-mail)
- ![Mailbox Mail logo](assets/img/email/mailbox-mail.svg){ .twemoji } [Mailbox Mail](#mailbox-mail)
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview).
OpenPGP also does not support forward secrecy, which means if the private key of either you or the message recipient is ever stolen, all previous messages encrypted with it will be exposed.
- [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys)
</div>
### Proton Mail
<div class="admonition recommendation" markdown>
![Proton Mail logo](assets/img/email/protonmail.svg){ align=right }
**Proton Mail** is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland.
The Proton Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
[:octicons-home-16: Homepage](https://proton.me/mail){ .md-button .md-button--primary }
[:simple-torbrowser:](https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion){ .card-link title="Onion Service" }
[:octicons-eye-16:](https://proton.me/mail/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://proton.me/support/mail){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/ProtonMail){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905)
- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases)
- [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download)
- [:simple-apple: macOS](https://proton.me/mail/bridge#download)
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
- [:octicons-browser-16: Web](https://mail.proton.me)
</details>
</div>
Free accounts have some limitations, such as not being able to search body text and not having access to [Proton Mail Bridge](https://proton.me/mail/bridge), which is required to use a [recommended desktop email client](email-clients.md) such as Thunderbird. Paid accounts include features like Proton Mail Bridge, additional storage, and custom domain support. The Proton Unlimited plan or any multi-user Proton plan includes access to [SimpleLogin](email-aliasing.md#simplelogin) Premium.
A [letter of attestation](https://res.cloudinary.com/dbulfrlrz/images/v1714639878/wp-pme/letter-of-attestation-proton-mail-20211109_3138714c61/letter-of-attestation-proton-mail-20211109_3138714c61.pdf) was provided for Proton Mail's apps in November 2021 by [Securitum](https://research.securitum.com).
Proton Mail has internal crash reports that are **not** shared with third parties and can be disabled.
=== "Web"
From your inbox, select :gear: → **All Settings****Account****Security and privacy****Privacy and data collection**.
- [ ] Disable **Collect usage dignostics**
- [ ] Disable **Send crash reports**
=== "Mobile"
From your inbox, select :material-menu: → :gear: **Settings** → select your username.
- [ ] Disable **Send crash reports**
- [ ] Disable **Collect usage dignostics**
#### :material-check:{ .pg-green } Custom Domains and Aliases
Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain.
#### :material-check:{ .pg-green } Private Payment Methods
Proton Mail [accepts](https://proton.me/support/payment-options) **cash** by mail in addition to standard credit/debit card, [Bitcoin](advanced/payments.md#other-coins-bitcoin-ethereum-etc), and PayPal payments. Additionally, you can use [**Monero**](cryptocurrency.md#monero) to purchase vouchers for Proton Mail Plus or Proton Unlimited via their [official](https://discuss.privacyguides.net/t/add-monero-as-an-anonymous-payment-method-for-proton-services/31058/15) reseller [ProxyStore](https://dys2p.com/en/2025-09-09-proton.html).
#### :material-check:{ .pg-green } Account Security
Proton Mail supports TOTP [two-factor authentication](https://proton.me/support/two-factor-authentication-2fa) and [hardware security keys](https://proton.me/support/2fa-security-key) using FIDO2 or U2F standards. The use of a hardware security key requires setting up TOTP two-factor authentication first.
#### :material-check:{ .pg-green } Data Security
Proton Mail stores your [emails](https://proton.me/blog/zero-access-encryption) and [calendars](https://proton.me/news/protoncalendar-security-model) with PGP-based encryption at rest, where only you have the decryption keys needed to access them later.
Certain information stored in [Proton Contacts](https://proton.me/support/proton-contacts), such as display names and email addresses, are **not** secured with your own encryption keys, so Proton is able to read them. Contact fields which are protected with your own encryption keys, such as phone numbers, are indicated with a padlock icon.
#### :material-check:{ .pg-green } Email Encryption
Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. Proton also supports automatic external key discovery with WKD. This means that emails sent to other providers which use WKD will be automatically encrypted with OpenPGP as well, without the need to manually exchange public PGP keys with your contacts. They also allow you to [encrypt messages to non-Proton Mail addresses without OpenPGP](https://proton.me/support/password-protected-emails), without the need for them to sign up for a Proton Mail account.
Proton Mail also publishes the public keys of Proton accounts via HTTP from their WKD. This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Proton's own domains, like `@proton.me`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately.
#### :material-information-outline:{ .pg-blue } Account Termination
If you have a paid account and your [bill is unpaid](https://proton.me/support/delinquency) after 14 days, you won't be able to access your data. After 30 days, your account will become delinquent and won't receive incoming mail. You will continue to be billed during this period. Proton will [delete inactive free accounts](https://proton.me/support/inactive-accounts) after one year. You **cannot** reuse the email address of a deactivated account.
#### :material-information-outline:{ .pg-blue } Additional Functionality
Proton Mail's [Unlimited](https://proton.me/support/proton-plans#proton-unlimited) plan also enables access to other Proton services in addition to providing multiple custom domains, unlimited hide-my-email aliases, and 500 GB of storage.
### Mailbox Mail
<div class="admonition recommendation" markdown>
![Mailbox Mail logo](assets/img/email/mailbox-mail.svg){ align=right }
**Mailbox Mail** (formerly *Mailbox.org*) is an email service with a focus on being secure, ad-free, and powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox Mail is based in Berlin, Germany.
Accounts start with up to 2 GB storage, which can be upgraded as needed.
[:octicons-home-16: Homepage](https://mailbox.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://kb.mailbox.org/en/private){ .card-link title="Documentation" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:octicons-browser-16: Web](https://login.mailbox.org)
</details>
</div>
#### :material-check:{ .pg-green } Custom Domains and Aliases
z
Mailbox Mail lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/use-your-own-domain-with-catch-all/) addresses. Mailbox Mail also supports [sub-addressing](https://kb.mailbox.org/en/private/e-mail/what-is-an-alias-and-how-do-i-use-it/), which is useful if you don't want to purchase a domain.
#### :material-check:{ .pg-green } Private Payment Methods
Mailbox Mail doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept **cash** by mail, **cash** payment to bank account, bank transfer, credit card, PayPal, and a couple of German-specific processors: Paydirekt and Sofortüberweisung.
#### :material-check:{ .pg-green } Account Security
Mailbox Mail supports [two-factor authentication](https://kb.mailbox.org/en/private/security-and-privacy/how-to-use-two-factor-authentication-2fa/) for their webmail only. You can use either TOTP or a [YubiKey](security-keys.md#yubikey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
Mailbox Mail allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/encryption/your-encrypted-mailbox/). New messages that you receive will then be immediately encrypted with your public key.
However, [Open-Xchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox Mail, [does not support](https://kb.mailbox.org/en/business/security-privacy-article/encryption-of-calendar-and-address-book/) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that data.
#### :material-check:{ .pg-green } Email Encryption
Mailbox Mail has [integrated encryption](https://kb.mailbox.org/en/private/encryption/how-can-e-mails-be-encrypted-with-pgp/) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/encryption/my-recipient-does-not-use-pgp/) on Mailbox Mail's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.
Mailbox Mail also supports the discovery of public keys via HTTP from their WKD. This allows people outside of Mailbox Mail to find the OpenPGP keys of Mailbox Mail accounts easily for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox Mail's own domains, like `@mailbox.org`. If you use a custom domain, you must [configure WKD](basics/email-security.md#what-is-the-web-key-directory-standard) separately.
#### :material-information-outline:{ .pg-blue } Account Termination
Your account will be set to a restricted user account when your contract ends. It will be irrevocably deleted after [30 days](https://kb.mailbox.org/en/en/private/account/reactivate-a-deleted-account/).
#### :material-information-outline:{ .pg-blue } Additional Functionality
You can access your Mailbox Mail account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/en/private/security-privacy/using-the-tor-exit-node-from-mailbox/). However, their webmail interface cannot be accessed via their .onion service, and you may experience TLS certificate errors.
All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive/encrypt-files-on-your-drive/). Mailbox Mail also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/business/e-mail-article/ensuring-e-mails-are-sent-securely/), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox Mail also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3.
Mailbox Mail has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs, providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address.
## More Providers
These providers encrypt your emails in a way that only you can read them later, making them great options for keeping your stored emails secure. However, they don't support interoperable encryption standards for E2EE communications between different providers.
<div class="grid cards" markdown>
- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .twemoji loading=lazy } [Tuta](#tuta)
</div>
### Tuta
<div class="admonition recommendation" markdown>
![Tuta logo](assets/img/email/tuta.svg#only-light){ align=right }
![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ align=right }
**Tuta** (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany.
Free accounts start with 1 GB of storage.
[:octicons-home-16: Homepage](https://tuta.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://tuta.com/support){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" }
[:octicons-heart-16:](https://tuta.com/community){ .card-link title="Contribute" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota)
- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609)
- [:simple-github: GitHub](https://github.com/tutao/tutanota/releases)
- [:fontawesome-brands-windows: Windows](https://tuta.com/#download)
- [:simple-apple: macOS](https://tuta.com/#download)
- [:simple-linux: Linux](https://tuta.com/#download)
- [:octicons-browser-16: Web](https://app.tuta.com)
</details>
</div>
Tuta doesn't support the [IMAP protocol](https://tuta.com/support#imap) or the use of third-party [email clients](email-clients.md), and you also won't be able to add [external email accounts](https://github.com/tutao/tutanota/issues/544#issuecomment-670473647) to the Tuta app. [Email import](https://github.com/tutao/tutanota/issues/630) is not currently supported either, though this is [due to be changed](https://tuta.com/blog/kickoff-import). Emails can be exported [individually or by bulk selection](https://tuta.com/support#generalMail) per folder, which may be inconvenient if you have many folders.
#### :material-check:{ .pg-green } Custom Domains and Aliases
Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/support#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/support#plus), but you can use a [catch-all](https://tuta.com/support#settings-global) with a custom domain.
#### :material-information-outline:{ .pg-blue } Private Payment Methods
Tuta only directly accepts credit cards and PayPal, however you can use [**cryptocurrency**](cryptocurrency.md) to purchase gift cards via their [partnership](https://tuta.com/support/#cryptocurrency) with ProxyStore.
#### :material-check:{ .pg-green } Account Security
Tuta supports [two-factor authentication](https://tuta.com/support#2fa) with either TOTP or U2F.
#### :material-check:{ .pg-green } Data Security
Tuta stores your [emails](https://tuta.com/support#what-encrypted), [address book contacts](https://tuta.com/support#encrypted-address-book), and [calendars](https://tuta.com/support#calendar) with strong encryption where only you have the decryption keys. This means the messages and other data stored in your account cannot be read by anyone other than you after they are stored.
#### :material-information-outline:{ .pg-blue } Email Encryption
Tuta [does not use OpenPGP](https://tuta.com/support/#pgp). Tuta accounts can only receive encrypted emails from non-Tuta email accounts when sent via a [temporary Tuta mailbox](https://tuta.com/support/#encrypted-email-external).
#### :material-information-outline:{ .pg-blue } Account Termination
Tuta will [delete inactive free accounts](https://tuta.com/support#inactive-accounts) after six months. You can reuse a deactivated free account if you pay.
#### :material-information-outline:{ .pg-blue } Additional Functionality
Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/secure-email-for-non-profit) for free or with a heavy discount.
## Criteria
**Please note we are not affiliated with any of the providers we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements for any email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an email provider, and conduct your own research to ensure the email provider you choose is the right choice for you.
### Technology
We regard these features as important in order to provide a safe and optimal service. You should consider whether the provider has the features you require.
**Minimum to Qualify:**
- Must encrypt email account data at rest with asymmetric encryption, where only the user has the private keys needed to decrypt it.
- Must be capable of exporting emails as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .EML with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard.
- Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
- Must operate on owned infrastructure, i.e. not built upon third-party email service providers.
**Best Case:**
- Should encrypt all account data (contacts, calendars, etc.) at rest with asymmetric encryption, where only the user has the private keys needed to decrypt it.
- Should provide integrated webmail E2EE/PGP encryption as a convenience.
- Should support WKD to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key with this command: `gpg --locate-key example_user@example.com`.
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
- Should support [sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing).
- Should allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
- Catch-all or alias functionality for those who use their own domains.
- Should use standard email access protocols such as IMAP, SMTP, or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider.
- Email provider's services should be available via an [onion service](https://en.wikipedia.org/wiki/.onion).
### Privacy
We prefer our recommended providers to collect as little data as possible.
**Minimum to Qualify:**
- Must protect sender's IP address, which can involve filtering it from showing in the `Received` header field.
- Must not require personally identifiable information (PII) besides a username and a password.
- Privacy policy must meet the requirements defined by the GDPR.
**Best Case:**
- Should accept [anonymous payment options](advanced/payments.md) ([cryptocurrency](cryptocurrency.md), cash, gift cards, etc.)
- Should be hosted in a jurisdiction with strong email privacy protection laws.
### Security
Email servers deal with a lot of very sensitive data. We expect that providers will adopt industry best practices in order to protect their customers.
**Minimum to Qualify:**
- Protection of webmail with 2FA, such as [TOTP](basics/multi-factor-authentication.md#time-based-one-time-password-totp).
- Encryption at rest, using asymmetric encryption where the service provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to, or a remote adversary from releasing data they have stolen by gaining unauthorized access to the server.
- [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support.
- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)).
- A server suite preference (optional on TLS 1.3) for strong cipher suites which support forward secrecy and authenticated encryption.
- A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy.
- Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records.
- Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records.
- Must have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`.
- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996).
- [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used.
- Website security standards such as:
- [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security)
- [Subresource Integrity](https://en.wikipedia.org/wiki/Subresource_Integrity) if loading things from external domains.
- Must support viewing of [message headers](https://en.wikipedia.org/wiki/Email#Message_header), as it is a crucial forensic feature to determine if an email is a phishing attempt.
**Best Case:**
- Should support hardware authentication, i.e. U2F and [WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online).
- [DNS Certification Authority Authorization (CAA) Resource Record](https://tools.ietf.org/html/rfc6844) in addition to DANE support.
- Should implement [Authenticated Received Chain (ARC)](https://en.wikipedia.org/wiki/Authenticated_Received_Chain), which is useful for people who post to mailing lists [RFC8617](https://tools.ietf.org/html/rfc8617).
- Published security audits from a reputable, third-party firm.
- Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
- Website security standards such as:
- [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy)
- [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163)
### Trust
You wouldn't trust your finances to someone with a fake identity, so why trust them with your email? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
**Minimum to Qualify:**
- Public-facing leadership or ownership.
**Best Case:**
- Frequent transparency reports.
### Marketing
With the email providers we recommend, we like to see responsible marketing.
**Minimum to Qualify:**
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.).
- Must not have any irresponsible marketing, which can include the following:
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
- Guarantees of protecting anonymity 100%. When someone makes a claim that something is 100%, it means there is no certainty for failure. We know people can quite easily de-anonymize themselves in a number of ways, e.g.:
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software such as Tor
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
**Best Case:**
- Clear and easy-to-read documentation for tasks like setting up 2FA, email clients, OpenPGP, etc.
### Additional Functionality
While not strictly requirements, there are some other convenience or privacy factors we looked into when determining which providers to recommend.
@@ -1,18 +0,0 @@
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg width="100%" height="100%" viewBox="0 0 142 142" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve" xmlns:serif="http://www.serif.com/" style="fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;">
<g transform="matrix(4.16667,0,0,4.16667,-142.092,-141.896)">
<g id="b" transform="matrix(1.00006,0,0,1.00006,0,0.00289614)">
<path d="M47.99,39.69L58.93,47.97C59.61,48.41 59.97,48.35 60.52,47.75C60.65,47.6 60.77,47.46 60.89,47.32C61.21,46.93 61.39,46.68 61.26,46.22C61.25,46.16 57.86,35.79 57.86,35.79C57.54,34.68 56.75,34.07 55.53,34.05L50.5,34.05C49.73,34.05 49.33,34.21 48.88,34.73L47.51,36.55C46.56,37.9 46.67,38.62 47.99,39.7" style="fill:rgb(171,230,89);fill-rule:nonzero;"/>
</g>
<g id="c" transform="matrix(1.00006,0,0,1.00006,0,0.00289614)">
<path d="M62.51,47.93L54.23,58.87C53.79,59.55 53.85,59.91 54.45,60.46C54.6,60.59 54.74,60.71 54.88,60.83C55.27,61.15 55.52,61.33 55.98,61.2C56.04,61.19 66.41,57.8 66.41,57.8C67.52,57.48 68.13,56.69 68.15,55.47L68.15,50.44C68.15,49.67 67.99,49.27 67.47,48.82L65.65,47.45C64.3,46.5 63.58,46.61 62.5,47.93" style="fill:rgb(171,230,89);fill-rule:nonzero;"/>
</g>
<g id="d" transform="matrix(1.00006,0,0,1.00006,0,0.00289614)">
<path d="M39.74,54.19L48.02,43.25C48.46,42.57 48.4,42.21 47.8,41.66C47.65,41.53 47.51,41.41 47.37,41.29C46.98,40.97 46.73,40.79 46.27,40.92C46.21,40.93 35.84,44.32 35.84,44.32C34.73,44.64 34.12,45.43 34.1,46.65L34.1,51.68C34.1,52.45 34.26,52.85 34.78,53.3L36.6,54.67C37.95,55.62 38.67,55.51 39.75,54.19" style="fill:rgb(171,230,89);fill-rule:nonzero;"/>
</g>
<g id="e" transform="matrix(1.00006,0,0,1.00006,0,0.00289614)">
<path d="M54.24,62.43L43.3,54.15C42.62,53.71 42.26,53.77 41.71,54.37C41.58,54.52 41.46,54.66 41.34,54.8C41.02,55.19 40.84,55.44 40.97,55.9C40.98,55.96 44.37,66.33 44.37,66.33C44.69,67.44 45.48,68.05 46.7,68.07L51.73,68.07C52.5,68.07 52.9,67.91 53.35,67.39L54.72,65.57C55.67,64.22 55.56,63.5 54.24,62.42" style="fill:rgb(171,230,89);fill-rule:nonzero;"/>
</g>
</g>
</svg>

Before

Width:  |  Height:  |  Size: 2.3 KiB

@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" width="979" height="785" fill="none" viewBox="0 0 979 785"><path fill="#6D4AFF" d="M0 22.5541C0 3.48617 22.2124 -6.94596 36.8738 5.23613L424.677 327.46C462.177 358.619 516.546 358.619 554.046 327.46L941.85 5.23618C956.511 -6.94591 978.723 3.48621 978.723 22.5541V683.7C978.723 739.646 933.393 785 877.476 785H101.247C45.3299 785 0 739.646 0 683.7V22.5541Z"/><path fill="url(#paint0_linear_6150_150885)" fill-rule="evenodd" d="M621.492 271.42L621.546 271.464L426.244 444.071C392.975 473.475 343.246 474.216 309.116 445.817L0 188.604V22.5541C0 3.48617 22.2124 -6.94596 36.8738 5.23613L424.677 327.46C462.177 358.619 516.546 358.619 554.046 327.46L621.492 271.42Z" clip-rule="evenodd"/><path fill="url(#paint1_linear_6150_150885)" fill-rule="evenodd" d="M770.604 147.526V785H877.476C933.393 785 978.723 739.642 978.723 683.699V22.5548C978.723 3.4868 956.51 -6.94715 941.849 5.23724L770.604 147.526Z" clip-rule="evenodd"/><defs><linearGradient id="paint0_linear_6150_150885" x1="738.261" x2="514.95" y1="384.02" y2="-568.829" gradientUnits="userSpaceOnUse"><stop stop-color="#E2DBFF"/><stop offset="1" stop-color="#6D4AFF"/></linearGradient><linearGradient id="paint1_linear_6150_150885" x1="1276.84" x2="514.868" y1="1301.35" y2="-325.532" gradientUnits="userSpaceOnUse"><stop offset=".271" stop-color="#E2DBFF"/><stop offset="1" stop-color="#6D4AFF"/></linearGradient></defs></svg>

Before

Width:  |  Height:  |  Size: 1.4 KiB

@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g fill="#00d2a7" stroke-width=".91795"><path d="m2.6793 0.33879 5.7992 5.8589c0.13565 0.13531 0.27131 0.16931 0.47479 0.16931h24.451c0.16955 0 0.27134-0.20331 0.10172-0.37254l-5.7313-5.7911c-0.13565-0.13565-0.27134-0.20331-0.5426-0.20331h-24.418c-0.23741 0-0.27131 0.20331-0.13565 0.33861z"/><path d="m1.8315 33.596c-0.034 0.13565 0.034 0.27096 0.20348 0.27096h24.112c0.23738 0 0.3391-0.10165 0.40693-0.30461l7.2913-23.503c0.06783-0.23696-0.034-0.30461-0.23738-0.30461h-24.18c-0.20341 0-0.27127 0.067653-0.3391 0.23696z"/><path d="m1.5914e-4 26.822c0 0.27096 0.33913 0.27096 0.40696 0l5.5279-17.983c0.067827-0.20331 0.067827-0.33861-0.10172-0.50802l-5.4939-5.4525c-0.13565-0.13565-0.33913-0.067653-0.33913 0.10165z"/></g></svg>

Before

Width:  |  Height:  |  Size: 836 B

-1
View File
@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g fill="#850122" stroke-width=".91795"><path d="m2.6792 0.33866 5.7992 5.8589c0.13565 0.13548 0.27131 0.16934 0.47479 0.16934h24.452c0.16955 0 0.27134-0.2032 0.10172-0.37253l-5.7313-5.7912c-0.13565-0.13548-0.27134-0.2032-0.5426-0.2032h-24.418c-0.23741 0-0.27131 0.2032-0.13565 0.33865z"/><path d="m1.8314 33.596c-0.034 0.13548 0.034 0.27089 0.20348 0.27089h24.113c0.23738 0 0.3391-0.10152 0.40693-0.30476l7.2914-23.503c0.06783-0.23703-0.034-0.30475-0.23738-0.30475h-24.18c-0.20341 0-0.27127 0.067758-0.3391 0.23703z"/><path d="m5.3925e-5 26.822c0 0.27089 0.33914 0.27089 0.40696 0l5.5279-17.983c0.067827-0.2032 0.067827-0.33865-0.10172-0.508l-5.494-5.4525c-0.13565-0.13548-0.33914-0.067723-0.33914 0.10158z"/></g></svg>

Before

Width:  |  Height:  |  Size: 828 B

@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="matrix(.29195 0 0 .29195 -2.6507e-5 -2.6507e-5)" clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2"><path d="m2 58c0 30.929 25.072 56 56 56s56-25.071 56-56c0-30.928-25.072-56-56-56s-56 25.072-56 56z" fill="#fff"/><path d="m58 14c24.3 0 44 19.7 44 44 0 24.301-19.7 44-44 44s-44-19.699-44-44c0-24.3 19.7-44 44-44" fill="#1a8cff"/><path d="m0 58c0 32.034 25.967 58 58 58s58-25.966 58-58c0-32.033-25.967-58-58-58s-58 25.967-58 58zm2 0c0-30.925 25.069-56 56-56s56 25.075 56 56-25.068 56-56 56-56-25.075-56-56z" fill-opacity=".5" fill-rule="nonzero"/><path d="m113.92 55c0.052 0.993 0.079 1.994 0.079 3 0 30.928-25.072 56-56 56s-56-25.072-56-56c0-1.006 0.027-2.007 0.079-3 1.559 29.533 26 53 55.921 53 29.69 0 53.985-23.106 55.88-52.318zm-55.921-47c27.062 0 49 21.938 49 49 0 15.13-6.857 28.657-17.632 37.646 9.002-8.397 14.632-20.364 14.632-33.646 0-25.405-20.595-46-46-46s-46 20.595-46 46c0 13.282 5.629 25.249 14.631 33.646-10.774-8.989-17.631-22.517-17.631-37.646 0-27.062 21.938-49 49-49z" fill-opacity=".05"/><path d="m58 14c24.304 0 44 19.703 44 44 0 24.298-19.696 44-44 44-24.06 0-43.606-19.31-43.994-43.272l-6e-3 -0.728c0-24.297 19.696-44 44-44zm0 2c-23.196 0-42 18.804-42 42 0 23.197 18.804 42 42 42s42-18.803 42-42c0-23.196-18.804-42-42-42z" fill-opacity=".26" fill-rule="nonzero"/><path d="m58.223 23h-0.127c-19.253 0-35.096 15.843-35.096 35.096v0.127c0 19.18 15.743 34.777 35.223 34.777 19.107 0 34.777-15.67 34.777-34.777 0-19.48-15.598-35.223-34.777-35.223zm-2e-3 2c18.004 0 32.779 14.775 32.779 33.221 0 18.005-14.775 32.779-32.779 32.779-18.446 0-33.221-14.774-33.221-32.779v-0.125c0-18.156 14.94-33.096 33.096-33.096h0.125z" fill-opacity=".25" fill-rule="nonzero"/><path d="m58.221 25c18.004 0 32.779 14.775 32.779 33.221 0 18.005-14.775 32.779-32.779 32.779-18.446 0-33.221-14.774-33.221-32.779v-0.125c0-18.156 14.94-33.096 33.096-33.096h0.125z" fill="#f7f7f7"/><path d="m73 58c0 8.284-6.716 15-15 15s-15-6.716-15-15 6.716-15 15-15 15 6.716 15 15z" fill-opacity=".05"/><path d="m58 41c-9.389 0-17 7.611-17 17s7.611 17 17 17 17-7.611 17-17-7.611-17-17-17zm0 2c8.284 0 15 6.716 15 15s-6.716 15-15 15-15-6.716-15-15 6.716-15 15-15z" fill="#fff" fill-rule="nonzero"/><path d="m58 43c8.284 0 15 6.716 15 15s-6.716 15-15 15-15-6.716-15-15 6.716-15 15-15zm0 2c-7.18 0-13 5.82-13 13s5.82 13 13 13 13-5.82 13-13-5.82-13-13-13z" fill-opacity=".15" fill-rule="nonzero"/><path d="m63.577 32h-11.154c-2.472 0-4.423 2.165-4.423 4.772v10.792c0 0.982 0.354 1.93 0.996 2.642l1.64 1.819c0.037 0.042 0.037 0.161 0 0.204l-1.64 1.818c-0.646 0.728-1.001 1.67-0.996 2.643v22.539c0 2.606 1.951 4.771 4.423 4.771h11.154c2.472 0 4.423-2.165 4.423-4.772v-10.792c5e-3 -0.973-0.35-1.914-0.996-2.642l-1.64-1.819c-0.037-0.042-0.037-0.161 0-0.204l1.64-1.818c0.646-0.728 1.001-1.67 0.996-2.643v-22.538c0-2.607-1.951-4.772-4.423-4.772zm-0.127 2.038c1.408 0 2.55 1.294 2.55 2.89v22.374c0 0.51-0.18 1-0.498 1.362l-1.594 1.806c-0.664 0.752-0.664 1.972 0 2.725l1.594 1.805c0.319 0.361 0.498 0.851 0.498 1.362v10.71c0 1.595-1.142 2.89-2.55 2.89h-10.9c-1.408 0-2.55-1.295-2.55-2.89v-22.375c0-0.51 0.18-1 0.498-1.362l1.594-1.806c0.664-0.752 0.664-1.972 0-2.725l-1.594-1.804c-0.325-0.379-0.502-0.863-0.498-1.363v-10.71c0-1.595 1.142-2.89 2.55-2.89h10.9z" fill="#fff" fill-rule="nonzero"/><path d="m50 47.621v-10.726c0-1.599 1.142-2.895 2.55-2.895h10.9c1.408 0 2.55 1.296 2.55 2.894v22.41c4e-3 0.5-0.173 0.984-0.498 1.364l-1.594 1.81c-0.664 0.753-0.664 1.974 0 2.728l1.594 1.809c0.319 0.362 0.498 0.853 0.498 1.364v10.727c0 1.598-1.142 2.894-2.55 2.894h-10.9c-1.408 0-2.55-1.296-2.55-2.894v-22.41c0-0.511 0.18-1.002 0.498-1.364l1.594-1.81c0.664-0.753 0.664-1.974 0-2.728l-1.594-1.809c-0.325-0.38-0.502-0.864-0.498-1.364z" fill="#0a2d4d"/><path d="m63.45 34c1.408 0 2.55 1.296 2.55 2.894v22.41c4e-3 0.5-0.173 0.984-0.498 1.364l-1.594 1.81c-0.664 0.753-0.664 1.974 0 2.728l1.594 1.809c0.319 0.362 0.498 0.853 0.498 1.364v10.727c0 1.598-1.142 2.894-2.55 2.894h-10.9c-1.408 0-2.55-1.296-2.55-2.894v-22.41c0-0.511 0.18-1.002 0.498-1.364l1.594-1.81c0.664-0.753 0.664-1.974 0-2.728l-1.594-1.809c-0.325-0.38-0.502-0.864-0.498-1.364v-10.727c0-1.598 1.142-2.894 2.55-2.894zm-0.288 2.054-10.324-0.013c-0.404 0-0.784 0.38-0.833 0.916l-5e-3 0.118v10.63c0 0.032 7e-3 0.059 0.015 0.078l0.014 0.023 1.671 1.794c1.306 1.403 1.35 3.601 0.135 5.059l-0.135 0.153-1.67 1.794c-0.01 0.01-0.02 0.031-0.025 0.058l-4e-3 0.043v22.218c0 0.559 0.353 0.975 0.752 1.028l0.086 6e-3 10.324 0.013c0.404 0 0.784-0.379 0.833-0.916l5e-3 -0.117v-10.631c0-0.027-5e-3 -0.053-0.015-0.078l-0.014-0.023-1.67-1.794c-1.306-1.403-1.35-3.6-0.135-5.058l0.135-0.154 1.67-1.794c0.01-0.01 0.02-0.03 0.025-0.057l4e-3 -0.044v-22.218c0-0.558-0.353-0.975-0.752-1.028l-0.086-6e-3z" fill-opacity=".4" fill-rule="nonzero"/></g></svg>

Before

Width:  |  Height:  |  Size: 4.8 KiB

@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867"><g stroke-width=".033"><path id="Background" fill="#175ddc" d="m33.867 28.575c0 2.9236-2.368 5.2917-5.2917 5.2917h-23.283c-2.9236 0-5.2917-2.368-5.2917-5.2917v-23.283c0-2.9236 2.368-5.2917 5.2917-5.2917h23.283c2.9236 0 5.2917 2.368 5.2917 5.2917z" class="st0"/><path id="Identity" fill="#fff" d="m27.444 4.2532c-0.21497-0.21497-0.46964-0.32081-0.76068-0.32081h-19.5c-0.29435 0-0.5457 0.10583-0.76068 0.32081s-0.32081 0.46964-0.32081 0.76068v13.001c0 0.96904 0.18852 1.9315 0.56555 2.8873 0.37703 0.9525 0.84667 1.7992 1.4056 2.54 0.55893 0.73753 1.2237 1.4585 1.9976 2.1597 0.77391 0.70115 1.4883 1.2799 2.1398 1.7429 0.65484 0.46302 1.3361 0.89958 2.0472 1.313 0.71107 0.41341 1.2171 0.69122 1.5147 0.83674s0.53909 0.26128 0.71768 0.33734c0.1356 0.06615 0.28112 0.10253 0.43987 0.10253s0.30427-0.03307 0.43987-0.10253c0.1819-0.07937 0.42003-0.19182 0.72099-0.33734 0.29766-0.14552 0.80367-0.42664 1.5147-0.83674 0.71107-0.41341 1.3924-0.84997 2.0472-1.313 0.65484-0.46302 1.3692-1.0451 2.1431-1.7429 0.77391-0.70115 1.4387-1.4188 1.9976-2.1597 0.55893-0.74083 1.0253-1.5842 1.4056-2.54 0.37703-0.9525 0.56555-1.9149 0.56555-2.8873v-12.998c0.0033-0.29435-0.10583-0.54901-0.32081-0.76398zm-2.5135 13.884c0 4.7063-7.997 8.761-7.997 8.761v-20.181h7.997v11.42z" class="st1"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.4 KiB

@@ -1,39 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="128px" height="128px" viewBox="0 0 128 128" version="1.1">
<defs>
<radialGradient id="radial0" gradientUnits="userSpaceOnUse" cx="0" cy="0" fx="0" fy="0" r="1" gradientTransform="matrix(56.396445,-90.752896,141.918875,88.192448,38.6304,130.494578)">
<stop offset="0" style="stop-color:rgb(100%,83.529412%,50.196078%);stop-opacity:1;"/>
<stop offset="0.09375" style="stop-color:rgb(96.470588%,77.254902%,57.254902%);stop-opacity:1;"/>
<stop offset="0.205" style="stop-color:rgb(92.156863%,71.372549%,63.529412%);stop-opacity:1;"/>
<stop offset="0.324466" style="stop-color:rgb(87.45098%,64.705882%,68.627451%);stop-opacity:1;"/>
<stop offset="0.42875" style="stop-color:rgb(82.745098%,59.215686%,74.509804%);stop-opacity:1;"/>
<stop offset="0.53375" style="stop-color:rgb(76.862745%,52.54902%,79.607843%);stop-opacity:1;"/>
<stop offset="0.64875" style="stop-color:rgb(70.980392%,47.058824%,85.098039%);stop-opacity:1;"/>
<stop offset="0.77125" style="stop-color:rgb(63.137255%,40%,89.803922%);stop-opacity:1;"/>
<stop offset="0.89125" style="stop-color:rgb(54.509804%,34.117647%,94.901961%);stop-opacity:1;"/>
<stop offset="1" style="stop-color:rgb(43.921569%,29.803922%,100%);stop-opacity:1;"/>
</radialGradient>
<linearGradient id="linear0" gradientUnits="userSpaceOnUse" x1="9.62492" y1="-7.14818" x2="16.6259" y2="35.5867" gradientTransform="matrix(3.555556,0,0,3.555556,0,0)">
<stop offset="0" style="stop-color:rgb(42.745098%,29.019608%,100%);stop-opacity:1;"/>
<stop offset="0.392009" style="stop-color:rgb(70.196078%,62.352941%,98.431373%);stop-opacity:0.976471;"/>
<stop offset="1" style="stop-color:rgb(100%,90.980392%,85.882353%);stop-opacity:0.8;"/>
</linearGradient>
<radialGradient id="radial1" gradientUnits="userSpaceOnUse" cx="0" cy="0" fx="0" fy="0" r="1" gradientTransform="matrix(45.362325,-72.996842,114.152316,70.937514,29.244693,117.483378)">
<stop offset="0" style="stop-color:rgb(100%,83.529412%,50.196078%);stop-opacity:1;"/>
<stop offset="0.09375" style="stop-color:rgb(96.470588%,77.254902%,57.254902%);stop-opacity:1;"/>
<stop offset="0.205" style="stop-color:rgb(92.156863%,71.372549%,63.529412%);stop-opacity:1;"/>
<stop offset="0.324466" style="stop-color:rgb(87.45098%,64.705882%,68.627451%);stop-opacity:1;"/>
<stop offset="0.42875" style="stop-color:rgb(82.745098%,59.215686%,74.509804%);stop-opacity:1;"/>
<stop offset="0.53375" style="stop-color:rgb(76.862745%,52.54902%,79.607843%);stop-opacity:1;"/>
<stop offset="0.64875" style="stop-color:rgb(70.980392%,47.058824%,85.098039%);stop-opacity:1;"/>
<stop offset="0.77125" style="stop-color:rgb(63.137255%,40%,89.803922%);stop-opacity:1;"/>
<stop offset="0.89125" style="stop-color:rgb(54.509804%,34.117647%,94.901961%);stop-opacity:1;"/>
<stop offset="1" style="stop-color:rgb(43.921569%,29.803922%,100%);stop-opacity:1;"/>
</radialGradient>
</defs>
<g id="surface1">
<path style=" stroke:none;fill-rule:nonzero;fill:url(#radial0);" d="M 38.492188 16.171875 C 47.417969 7.242188 51.882812 2.777344 57.03125 1.105469 C 61.5625 -0.367188 66.4375 -0.367188 70.96875 1.105469 C 76.117188 2.777344 80.582031 7.242188 89.507812 16.171875 L 111.828125 38.492188 C 120.757812 47.417969 125.222656 51.882812 126.894531 57.03125 C 128.367188 61.5625 128.367188 66.4375 126.894531 70.96875 C 125.222656 76.117188 120.757812 80.582031 111.828125 89.507812 L 89.507812 111.828125 C 80.582031 120.757812 76.117188 125.222656 70.96875 126.894531 C 66.4375 128.367188 61.5625 128.367188 57.03125 126.894531 C 51.882812 125.222656 47.417969 120.757812 38.492188 111.828125 L 34.292969 107.125 C 31.753906 104.277344 30.484375 102.855469 29.578125 101.234375 C 28.777344 99.800781 28.1875 98.253906 27.832031 96.648438 C 27.429688 94.835938 27.429688 92.929688 27.429688 89.113281 L 27.429688 38.886719 C 27.429688 35.070312 27.429688 33.164062 27.832031 31.351562 C 28.1875 29.746094 28.777344 28.199219 29.578125 26.765625 C 30.484375 25.144531 31.753906 23.722656 34.292969 20.875 Z M 38.492188 16.171875 "/>
<path style=" stroke:none;fill-rule:nonzero;fill:url(#linear0);" d="M 38.492188 16.171875 C 47.417969 7.242188 51.882812 2.777344 57.03125 1.105469 C 61.5625 -0.367188 66.4375 -0.367188 70.96875 1.105469 C 76.117188 2.777344 80.582031 7.242188 89.507812 16.171875 L 111.828125 38.492188 C 120.757812 47.417969 125.222656 51.882812 126.894531 57.03125 C 128.367188 61.5625 128.367188 66.4375 126.894531 70.96875 C 125.222656 76.117188 120.757812 80.582031 111.828125 89.507812 L 89.507812 111.828125 C 80.582031 120.757812 76.117188 125.222656 70.96875 126.894531 C 66.4375 128.367188 61.5625 128.367188 57.03125 126.894531 C 51.882812 125.222656 47.417969 120.757812 38.492188 111.828125 L 34.292969 107.125 C 31.753906 104.277344 30.484375 102.855469 29.578125 101.234375 C 28.777344 99.800781 28.1875 98.253906 27.832031 96.648438 C 27.429688 94.835938 27.429688 92.929688 27.429688 89.113281 L 27.429688 38.886719 C 27.429688 35.070312 27.429688 33.164062 27.832031 31.351562 C 28.1875 29.746094 28.777344 28.199219 29.578125 26.765625 C 30.484375 25.144531 31.753906 23.722656 34.292969 20.875 Z M 38.492188 16.171875 "/>
<path style=" stroke:none;fill-rule:nonzero;fill:url(#radial1);" d="M 36.894531 17.761719 C 41.359375 13.296875 43.59375 11.066406 46.167969 10.230469 C 48.433594 9.492188 50.871094 9.492188 53.132812 10.230469 C 55.707031 11.066406 57.941406 13.296875 62.40625 17.761719 L 95.886719 51.242188 C 100.351562 55.707031 102.582031 57.941406 103.421875 60.515625 C 104.15625 62.777344 104.15625 65.21875 103.421875 67.480469 C 102.582031 70.054688 100.351562 72.289062 95.886719 76.753906 L 62.40625 110.234375 C 57.941406 114.699219 55.707031 116.929688 53.132812 117.765625 C 50.871094 118.503906 48.433594 118.503906 46.167969 117.765625 C 43.59375 116.929688 41.359375 114.699219 36.894531 110.234375 L 16.171875 89.507812 C 7.242188 80.578125 2.777344 76.113281 1.105469 70.964844 C -0.367188 66.4375 -0.367188 61.558594 1.105469 57.03125 C 2.777344 51.882812 7.242188 47.417969 16.171875 38.488281 Z M 36.894531 17.761719 "/>
</g>
</svg>

Before

Width:  |  Height:  |  Size: 6.0 KiB

@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="matrix(.19393 0 0 .19393 6.0387 -1.3311)"><g transform="matrix(.35278 0 0 -.35278 -19.503 50.728)"><path d="m0 0 77.64-46.117 137.18 81.142 136.02-80.558 77.056 44.949-212.49 124.92z" style="fill-rule:evenodd;fill:#98daaf"/></g><g transform="matrix(.35278 0 0 -.35278 29.715 75.029)"><path d="m0 0 75.304-44.949 73.553 42.03-73.553 43.198z" style="fill-rule:evenodd;fill:#98daaf"/></g><g transform="matrix(.35278 0 0 -.35278 -19.503 50.522)"><path d="m0 0v-246.93l77.64-43.781 0.583 244.01z" style="fill-rule:evenodd;fill:#4ac08f"/></g><g transform="matrix(.35278 0 0 -.35278 29.921 75.029)"><path d="m0 0-0.583-81.142 75.304-42.614 74.137 43.781v75.889l-73.553-41.447z" style="fill-rule:evenodd;fill:#4ac08f"/></g><g transform="matrix(.35278 0 0 -.35278 104.06 66.997)"><path d="m0 0 0.584-130.76-136.02-78.807-74.721 41.447v-112.66l74.137-43.782 214.82 124.34-1.167 244.59z" style="fill-rule:evenodd;fill:#4ac08f"/></g></g></svg>

Before

Width:  |  Height:  |  Size: 1.0 KiB

-59
View File
@@ -1,59 +0,0 @@
---
title: "Router Firmware"
icon: material/router-wireless
description: Alternative operating systems for securing your router or Wi-Fi access point.
cover: router.webp
---
<small>Protects against the following threat(s):</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc.
## OpenWrt
<div class="admonition recommendation" markdown>
![OpenWrt logo](assets/img/router/openwrt.svg#only-light){ align=right }
![OpenWrt logo](assets/img/router/openwrt-dark.svg#only-dark){ align=right }
**OpenWrt** is a Linux-based operating system; it's primarily used on embedded devices to route network traffic. It includes util-linux, uClibc, and BusyBox. All the components have been optimized for home routers.
[:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary }
[:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/openwrt/openwrt){ .card-link title="Source Code" }
[:octicons-heart-16:](https://openwrt.org/donate){ .card-link title=Contribute }
</details>
</div>
You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to check if your device is supported.
## OPNsense
<div class="admonition recommendation" markdown>
![OPNsense logo](assets/img/router/opnsense.svg){ align=right }
**OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint.
[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary }
[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" }
[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
</details>
</div>
OPNsense was originally developed as a fork of [pfSense](https://en.wikipedia.org/wiki/PfSense), and both projects are noted for being free and reliable firewall distributions which offer features often only found in expensive commercial firewalls. Launched in 2015, the developers of OPNsense [cited](https://docs.opnsense.org/history/thefork.html) a number of security and code-quality issues with pfSense which they felt necessitated a fork of the project, as well as concerns about Netgate's majority acquisition of pfSense and the future direction of the pfSense project.
## Criteria
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
- Must be open source.
- Must receive regular updates.
- Must support a wide variety of hardware.
File diff suppressed because one or more lines are too long

Before

Width:  |  Height:  |  Size: 8.7 KiB

File diff suppressed because one or more lines are too long

Before

Width:  |  Height:  |  Size: 8.6 KiB

@@ -1 +0,0 @@
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="scale(.39843)" fill="#de3c07"><polygon class="st0" points="85 26.6 58.5 0 18.6 0 18.6 18.6 66.4 18.6 66.4 66.4 85 66.4"/><polygon class="st0" points="0 58.5 26.6 85 66.4 85 66.4 66.4 18.6 66.4 18.6 18.6 0 18.6"/></g></svg>

Before

Width:  |  Height:  |  Size: 344 B

-394
View File
@@ -1,394 +0,0 @@
---
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: VPN Services
icon: material/vpn
description: The best VPN services for protecting your privacy and security online. Find a provider here that isn't out to spy on you.
cover: vpn.webp
global:
- [randomize-element, "table tbody"]
---
<small>Protects against the following threat(s):</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
If you're looking for additional *privacy* from your ISP, on a public Wi-Fi network, or while torrenting files, a **VPN** may be the solution for you.
<div class="admonition danger" markdown>
<p class="admonition-title">VPNs do not provide anonymity</p>
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.
[Introduction to the Tor Browser](tor.md#tor-browser){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button }
</div>
[Detailed VPN Overview :material-arrow-right-drop-circle:](basics/vpn-overview.md){ .md-button }
## Recommended Providers
Our recommended providers use encryption, support WireGuard & OpenVPN, and have a no logging policy. Read our [full list of criteria](#criteria) for more information.
| Provider | Countries | WireGuard | Port Forwarding | IPv6 | Anonymous Payments |
|---|---|---|---|---|---|
| [Proton](#proton-vpn) | 127+ | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } Partial Support | :material-information-outline:{ .pg-blue } Limited Support | Cash |
| [IVPN](#ivpn) | 41+ | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } | :material-information-outline:{ .pg-blue } Outgoing Only | Monero Cash |
| [Mullvad](#mullvad) | 49+ | :material-check:{ .pg-green } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero Cash |
### Proton VPN
<div class="admonition recommendation" markdown>
![Proton VPN logo](assets/img/vpn/protonvpn.svg){ align=right }
**Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option.
[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://protonvpn.com/support){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085)
- [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases)
- [:fontawesome-brands-windows: Windows](https://protonvpn.com/download-windows)
- [:simple-apple: macOS](https://protonvpn.com/download-macos)
- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
</details>
</div>
#### :material-check:{ .pg-green } 127 Countries
Proton VPN has [servers in 127 countries](https://protonvpn.com/vpn-servers)(1) or [10](https://protonvpn.com/support/how-to-create-free-vpn-account) if you use their [free plan](https://protonvpn.com/blog/product-roadmap-winter-2025-2026).(2) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
{ .annotate }
1. Of which at least 71 are virtual servers, meaning your IP will appear from the country but the server is in another. 12 more locations have both hardware and virtual servers. [Source](https://protonvpn.com/support/how-smart-routing-works)
2. Last checked: 2025-10-28
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
#### :material-check:{ .pg-green } Independently Audited
Independent security researcher Ruben Santamarta conducted audits for Proton VPN's [browser extensions](https://drive.proton.me/urls/RWDD2SHT98#v7ZrwNcafkG8) and [apps](https://drive.proton.me/urls/RVW8TXG484#uTXX5Fc9GADo) in September 2024 and January 2025, respectively. Proton VPN's infrastrcture has undergone [annual audits](https://protonvpn.com/blog/no-logs-audit) by Securitum since 2022.
Previously, Proton VPN underwent an independent audit by SEC Consult in January 2020. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform in their dedicated [blog post](https://web.archive.org/web/20250307041036/https://protonvpn.com/blog/open-source) on the audit.
#### :material-check:{ .pg-green } Open-Source Clients
Proton VPN provides the source code for their desktop and mobile clients in their [GitHub organization](https://github.com/ProtonVPN).
#### :material-check:{ .pg-green } Accepts Cash
Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](advanced/payments.md#other-coins-bitcoin-ethereum-etc), also accepts **cash/local currency** as an anonymous form of payment.
#### :material-check:{ .pg-green } WireGuard Support
Proton VPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant.
Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. Proton VPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install).
#### :material-alert-outline:{ .pg-orange } Limited IPv6 Support
Proton [now supports IPv6](https://protonvpn.com/support/prevent-ipv6-vpn-leaks) in their browser extension and Linux client, but only 80% of their servers are IPv6-compatible. On other platforms, the Proton VPN client will block all outgoing IPv6 traffic, so you don't have to worry about your IPv6 address being leaked, but you will not be able to connect to any IPv6-only sites, nor will you be able to connect to Proton VPN from an IPv6-only network.
#### :material-information-outline:{ .pg-info } Remote Port Forwarding
Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The official Windows and Linux apps provide an easy-to-access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively.
#### :material-information-outline:{ .pg-blue } Anti-Censorship
Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or WireGuard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic.
Unfortunately, it does not work very well in countries where sophisticated filters that analyze all outgoing traffic in an attempt to discover encrypted tunnels are deployed. Stealth is available on Android, iOS, Windows, and macOS, but it's not yet available on Linux.
#### :material-check:{ .pg-green } Mobile Clients
Proton VPN has published [App Store](https://apps.apple.com/app/id1437005085) and [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/ProtonVPN/android-app/releases).
<div class="admonition warning" markdown>
<p class="admonition-title">How to opt out of sharing telemetry</p>
On Android, Proton hides telemetry settings under the misleadingly labeled "**Help us fight censorship**" menu in the settings panel. On other platforms these settings can be found under the "**Usage statistics**" menu.
We are noting this because while we don't necessarily recommend against sharing anonymous usage statistics with developers, it is important that these settings are easily found and clearly labeled.
</div>
#### :material-alert-outline:{ .pg-orange } Additional Notes
Proton VPN clients support two-factor authentication on all platforms. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](tor.md#tor-browser) for this purpose.
##### Kill switch feature provides poor protections on macOS
Proton VPN's kill switch on macOS does not block any traffic when you intentionally disconnect from the VPN, *including when you disconnect by switching servers.* You should not make any sensitive connections while the VPN is turned off, nor when switching servers. It is only designed to prevent traffic leaks in the case of an unexpected VPN disconnection, which is still a useful feature to have, but it does not provide the same level of protection as a kill switch that blocks all traffic when the VPN is turned off.
Additionally, system crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN kill switch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service.
### IVPN
<div class="admonition recommendation" markdown>
![IVPN logo](assets/img/vpn/ivpn.svg){ align=right }
**IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and does not offer a free trial.
[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary }
[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683)
- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client)
- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases)
- [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows)
- [:simple-apple: macOS](https://ivpn.net/apps-macos)
- [:simple-linux: Linux](https://ivpn.net/apps-linux)
</details>
</div>
#### :material-check:{ .pg-green } 41 Countries
IVPN has [servers in 41 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
{ .annotate }
1. Last checked: 2025-10-28
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
#### :material-check:{ .pg-green } Independently Audited
IVPN has had multiple [independent audits](https://ivpn.net/en/blog/tags/audit) since 2019 and has publicly announced their commitment to [annual security audits](https://ivpn.net/blog/ivpn-apps-security-audit-concluded).
#### :material-check:{ .pg-green } Open-Source Clients
As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn).
#### :material-check:{ .pg-green } Accepts Cash and Monero
In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, **Monero** and **cash/local currency** (on annual plans) as anonymous forms of payment. You can also purchase [prepaid cards](https://ivpn.net/knowledgebase/billing/voucher-cards-faq) with redeem codes.
#### :material-check:{ .pg-green } WireGuard Support
IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant.
IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install).
#### :material-information-outline:{ .pg-blue } IPv6 Support
IVPN allows you to [connect to services using IPv6](https://ivpn.net/knowledgebase/general/do-you-support-ipv6) but doesn't allow you to connect from a device using an IPv6 address.
#### :material-alert-outline:{ .pg-orange } Remote Port Forwarding
IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients.
#### :material-check:{ .pg-green } Anti-Censorship
IVPN has obfuscation modes using [V2Ray](https://v2ray.com/en/index) which helps in situations where VPN protocols like OpenVPN or WireGuard are blocked. It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic.
#### :material-check:{ .pg-green } Mobile Clients
IVPN has published [App Store](https://apps.apple.com/app/id1193122683) and [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/ivpn/android-app/releases).
#### :material-information-outline:{ .pg-blue } Additional Notes
IVPN clients support two-factor authentication. IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level.
### Mullvad
<div class="admonition recommendation" markdown>
![Mullvad logo](assets/img/vpn/mullvad.svg){ align=right }
**Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. Mullvad is based in Sweden and offers a 14-day money-back guarantee for [payment methods](https://mullvad.net/en/help/refunds) that allow it.
[:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary }
[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" }
[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513)
- [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases)
- [:fontawesome-brands-windows: Windows](https://mullvad.net/en/download/windows)
- [:simple-apple: macOS](https://mullvad.net/en/download/macos)
- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
</details>
</div>
#### :material-check:{ .pg-green } 49 Countries
Mullvad has [servers in 49 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
{ .annotate }
1. Last checked: 2025-10-28
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
#### :material-check:{ .pg-green } Independently Audited
Mullvad has had multiple [independent audits](https://mullvad.net/en/blog/tag/audits) and has publicly announced their endeavors to conduct [annual audits](https://mullvad.net/en/blog/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) of their apps and infrastructure.
#### :material-check:{ .pg-green } Open-Source Clients
Mullvad provides the source code for their desktop and mobile clients in their [GitHub organization](https://github.com/mullvad/mullvadvpn-app).
#### :material-check:{ .pg-green } Accepts Cash and Monero
Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, **Monero** and **cash/local currency** as anonymous forms of payment. You can also purchase [prepaid cards](https://mullvad.net/en/help/partnerships-and-resellers) with redeem codes. Mullvad also accepts Swish and bank wire transfers, as well as a few European payment systems.
#### :material-check:{ .pg-green } WireGuard Support
Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant.
Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the only protocol supported on their mobile apps, and their desktop apps will [lose OpenVPN support](https://mullvad.net/en/blog/reminder-that-openvpn-is-being-removed) in 2025. Additionally, their servers will stop accepting OpenVPN connections by January 15, 2026.
Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install).
#### :material-check:{ .pg-green } IPv6 Support
Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support) and connect from a device using an IPv6 address.
#### :material-alert-outline:{ .pg-orange } Remote Port Forwarding
Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients.
#### :material-check:{ .pg-green } Anti-Censorship
Mullvad offers several features to help bypass censorship and access the internet freely:
- **Obfuscation modes**: Mullvad has two built-in obfuscation modes: "UDP-over-TCP" and ["WireGuard over Shadowsocks"](https://mullvad.net/en/blog/introducing-shadowsocks-obfuscation-for-wireguard). These modes disguise your VPN traffic as regular web traffic, making it harder for censors to detect and block. Supposedly, China has to use a [new method to disrupt Shadowsocks-routed traffic](https://gfw.report/publications/usenixsecurity23/en).
- **Advanced obfuscation with Shadowsocks and v2ray**: For more advanced users, Mullvad provides a guide on how to use the [Shadowsocks with v2ray](https://mullvad.net/en/help/shadowsocks-with-v2ray) plugin with Mullvad clients. This setup provides an additional layer of obfuscation and encryption.
- **Custom server IPs**: To counter IP-blocking, you can request custom server IPs from Mullvad's support team. Once you receive the custom IPs, you can input the text file in the "Server IP override" settings, which will override the chosen server IP addresses with ones that aren't known to the censor.
- **Bridges and proxies**: Mullvad also allows you to use bridges or proxies to reach their API (needed for authentication), which can help bypass censorship attempts that block access to the API itself.
#### :material-check:{ .pg-green } Mobile Clients
Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases).
#### :material-information-outline:{ .pg-blue } Additional Notes
Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They also provide the option to enable Defense Against AI-guided Traffic Analysis ([DAITA](https://mullvad.net/en/blog/daita-defense-against-ai-guided-traffic-analysis)) in their apps. DAITA protects against the threat of advanced traffic analysis which can be used to connect patterns in VPN traffic with specific websites.
## Criteria
<div class="admonition danger" markdown>
<p class="admonition-title">Danger</p>
It is important to note that using a VPN provider will not make you anonymous, but it will give you better privacy in certain situations. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
</div>
**Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible.
### Technology
We require our recommended providers to support modern technologies currently available to VPNs.
**Minimum to Qualify:**
- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps.
- Support for strong protocols such as WireGuard.
- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly.
- Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise.
- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing.
- Censorship resistance features designed to bypass firewalls without DPI.
**Best Case:**
- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.)
- Easy-to-use VPN clients
- [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses.
- Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble).
- Obfuscation technology which camouflages the true nature of internet traffic, designed to circumvent advanced internet censorship methods like DPI.
### Privacy
We prefer our recommended providers to collect as little data as possible. Not collecting personal information on registration, and accepting anonymous forms of payment are required.
**Minimum to Qualify:**
- [Anonymous cryptocurrency](cryptocurrency.md) **or** cash payment option.
- No personal information required to register: Only username, password, and email at most.
**Best Case:**
- Accepts multiple [anonymous payment options](advanced/payments.md).
- No personal information accepted (auto-generated username, no email required, etc.).
### Security
A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.
**Minimum to Qualify:**
- Strong Encryption Schemes: OpenVPN with SHA-256 authentication; RSA-2048 or better handshake; AES-256-GCM or AES-256-CBC data encryption.
- Forward Secrecy.
- Published security audits from a reputable third-party firm.
- VPN servers that use full-disk encryption or are RAM-only.
**Best Case:**
- Strongest Encryption: RSA-4096.
- Optional quantum-resistant encryption.
- Comprehensive published security audits from a reputable third-party firm.
- Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
- RAM-only VPN servers.
### Trust
You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
**Minimum to Qualify:**
- Public-facing leadership or ownership.
- Company based in a jurisdiction where it cannot be forced to do secret logging.
**Best Case:**
- Public-facing leadership.
- Frequent transparency reports.
### Marketing
With the VPN providers we recommend we like to see responsible marketing.
**Minimum to Qualify:**
- Must self-host analytics (i.e., no Google Analytics).
Must not have any marketing which is irresponsible:
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
**Best Case:**
Responsible marketing that is both educational and useful to the consumer could include:
- An accurate comparison to when [Tor](tor.md) should be used instead.
- Availability of the VPN provider's website over a [.onion service](https://en.wikipedia.org/wiki/.onion)
### Additional Functionality
While not strictly requirements, there are some factors we looked into when determining which providers to recommend. These include content blocking functionality, warrant canaries, excellent customer support, the number of allowed simultaneous connections, etc.
-1
View File
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 113 70"><g fill="#F34" fill-rule="nonzero"><path d="M56.958 43.56c1.31-3.43 2.63-6.84 3.91-10.26 3.64-9.69 7.29-19.36 10.85-29.07a2.63 2.63 0 0 1 2.94-2 3523 3523 0 0 0 29.09.1c2.67 0 5.35-.12 7.58-1.93.3-.24.65-.47.95-.12a1.45 1.45 0 0 1 .14 1.49c-.83 2.36-1.7 4.72-2.56 7.08-2.16 6-3.35 6.81-9.69 6.84-4.22 0-8.45.07-12.66 0a2.54 2.54 0 0 0-2.88 2c-5.8 16.13-11.72 32.21-17.48 48.34-.79 2.22-1.81 3.09-4.24 3-4.58-.22-9.18-.12-13.76 0a2.51 2.51 0 0 1-2.9-1.94c-5.85-16.39-11.82-32.72-17.7-49.06-.62-1.73-1.37-2.43-3.28-2.37-4.44.16-8.88.09-13.33 0-5.22-.07-6.71-1.17-8.49-6.06-.9-2.5-1.81-5-2.7-7.5C.528 1.47.288.68.878.24c.59-.44 1 .38 1.48.65a13 13 0 0 0 6.65 1.42c9.63 0 19.25 0 28.87-.12 2.25 0 3.34.6 4.15 2.84 4.52 12.4 9.22 24.67 13.85 36.98.2.53.23 1.19 1.08 1.55Z"/><path d="M89.368 36.14h-6c-1 0-1.55-.18-1.1-1.38 1.34-3.58 2.66-7.18 3.93-10.8.37-1.07 1.11-1.2 2.07-1.19h9.3c2.22 0 4.43-.29 6.27-1.76.29-.24.64-.55.95-.26.222.283.323.643.28 1a8.09 8.09 0 0 1-.46 1.7c-.93 2.63-2 5.23-2.81 7.9-.92 3.07-3.09 4.42-6 4.65-2.12.17-4.27 0-6.41 0l-.02.14ZM81.838 56.61h-5.77c-1.24 0-1.77-.13-1.19-1.59a169.469 169.469 0 0 0 3.7-10.19 2.1 2.1 0 0 1 2.44-1.62c3.18.06 6.36.06 9.54 0a9.45 9.45 0 0 0 5.66-1.62c.35-.25.71-.77 1.11-.39.259.358.343.813.23 1.24-.49 1.62-1.06 3.22-1.62 4.82-.49 1.39-1.1 2.75-1.46 4.17-.94 3.74-3.62 5-7.09 5.14-1.85.08-3.7 0-5.55 0v.04ZM23.548 36.02c-2.07 0-4.15.13-6.21 0-2.95-.22-5.12-1.52-6.06-4.6-.94-3.08-2.07-5.84-3.12-8.75-.22-.63-.55-1.35 0-1.87s1 .29 1.44.57a11 11 0 0 0 5.83 1.33c3.1.06 6.21.06 9.31 0 1 0 1.78.17 2.18 1.35 1.16 3.42 2.43 6.81 3.71 10.19.5 1.34.22 1.9-1.29 1.84-1.92-.08-3.84 0-5.76 0l-.03-.06ZM30.798 56.61c-2.22-.15-4.88.26-7.52-.42a5.55 5.55 0 0 1-4.26-3.75c-1-3.06-2.21-6.09-3.3-9.14-.25-.69-.63-1.55 0-2.09.63-.54 1.07.44 1.59.71a10.87 10.87 0 0 0 5.1 1.28c3.25 0 6.5.08 9.75 0a2 2 0 0 1 2.26 1.53c1.12 3.36 2.34 6.68 3.61 10 .53 1.37.45 2-1.26 1.9-1.71-.1-3.7-.02-5.97-.02Z"/></g></svg>

Before

Width:  |  Height:  |  Size: 2.0 KiB

-1
View File
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" width="384" height="128" version="1.1" viewBox="0 0 101.6 33.867"><g><g transform="translate(0 -263.13) matrix(.072143 0 0 .072143 -44.234 303.31)"><g id="Designs" fill="none" fill-rule="evenodd" transform="matrix(16.188 0 0 16.188 613.15 -556.97)"><g id="_Assets" fill="#f34" transform="translate(-48,-1754)"><g id="ivpn-logo"><path d="m6.9867 0h6.2484c0.07765 0 0.15155 0.034519 0.20174 0.094486 0.05068 0.059715 0.07241 0.13883 0.05942 0.21644l-4.5997 28.069c-0.020224 0.12346-0.12284 0.21618-0.24643 0.22324l-6.8703 0.39584c-0.0049935 2.52e-4 -0.0097373 5.04e-4 -0.01498 5.04e-4 -0.074902 0-0.14681-0.032-0.19699-0.08869-0.05393-0.06072-0.077649-0.14261-0.064166-0.22274l3.8812-23.463c-0.08136-3.4959-4.3574-4.3411-4.8792-4.4719-0.56307-0.14146-0.50388-0.75335-0.50388-0.75335zm33.476 0.12655c-0.047197-0.078505-0.13132-0.12655-0.22204-0.12655h-6.7405c-0.09684 0-0.18512 0.054483-0.23011 0.14091l-9.3019 17.994-3.1663-17.919c-0.022253-0.12556-0.12961-0.21669-0.2553-0.21669h-6.7868c-0.07703 0-0.15064 0.034919-0.19979 0.095346-0.04915 0.059932-0.06945 0.13943-0.05527 0.21645l5.0251 26.948c0.02323 0.12457 0.13058 0.21397 0.25481 0.21397 0.0046 0 0.0098-2.47e-4 0.01467-4.95e-4l7.8344-0.4532c0.09121-0.0052 0.17338-0.05869 0.21544-0.14091l13.622-26.495c0.04206-0.081725 0.03888-0.1793-0.0081-0.2578zm20.994 5.6861c-0.087067-0.81396-0.27194-1.5371-0.54983-2.1501-0.27885-0.61303-0.62974-1.1384-1.0427-1.5612-0.4079-0.41575-0.83608-0.76233-1.2781-1.0334-1.0708-0.62009-2.3434-0.97909-3.7985-1.068h-12.877c-0.12356 0-0.22948 0.091333-0.24975 0.21579l-4.1575 25.431c-0.01288 0.07745 0.01002 0.15661 0.06131 0.2153 0.04795 0.0548 0.11665 0.08573 0.18845 0.08573 5e-3 0 0.0093-2.43e-4 0.01431-4.87e-4l6.4737-0.37727c0.11832-0.0068 0.21612-0.09669 0.23544-0.21603l0.77382-4.7919 6.3017-4.87e-4c1.4336-0.08792 2.7869-0.44473 4.022-1.0602 1.0684-0.53095 2.1106-1.3861 3.0984-2.5408 0.99662-1.1657 1.6915-2.8245 2.0636-4.9315l0.59182-3.4083c0.17151-1.0539 0.21516-1.9986 0.12857-2.8077zm-7.4661 6.0769c-0.07705 0.39237-0.2185 0.73554-0.42317 1.0232-0.17747 0.25841-0.41744 0.48954-0.71252 0.68609-0.28028 0.18681-0.66696 0.28131-1.149 0.28131h-5.4024l1.1426-7.2421h5.484c0.46825 0 0.80937 0.094256 1.0136 0.27911 0.22304 0.20264 0.38524 0.43134 0.4797 0.67124 0.09923 0.28058 0.13692 0.62253 0.1145 0.98981zm32.753-11.89h-6.5505c-0.1253 0-0.23269 0.096229-0.25325 0.22736l-2.3337 14.831-5.0595-14.879c-0.037008-0.10752-0.13328-0.17963-0.24164-0.17963h-6.5505c-0.1253 0-0.23269 0.096229-0.25325 0.22736l-3.9972 25.403c-0.01306 0.0816 0.0099 0.165 0.06216 0.22684 0.04862 0.05774 0.11828 0.09033 0.19085 0.09033 0.0051 0 6.6654-0.40339 6.6654-0.40339 0.11998-0.0072 0.21915-0.10162 0.23874-0.22736l1.6709-10.72 3.5291 10.422c0.03846 0.11394 0.14174 0.18296 0.25616 0.17988l8.8813-0.53811c0.11973-0.0072 0.21891-0.10136 0.2385-0.22736l3.7596-24.117c0.01258-0.079036-0.0085-0.15961-0.05757-0.22043-0.048618-0.061073-0.12046-0.096229-0.19568-0.096229z" transform="translate(48,1754)"/></g></g></g></g></g></svg>

Before

Width:  |  Height:  |  Size: 3.0 KiB

-1
View File
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 77 77"><g fill="none" fill-rule="nonzero"><path fill="#192E45" d="M0 38.274c0 21.152 17.152 38.274 38.274 38.274s38.274-17.122 38.274-38.274S59.426 0 38.274 0 0 17.122 0 38.274Z"/><path fill="#D0933A" d="m5.121 33.698 2.91-4.06-.182 5.848.818-4.394c2.424 4.91 8.364 11.697 13.788 15.334.576.394 1.061.818 1.394 1.242.697.273 1.394.425 2.091.546.364.06.758.09 1.122.121.363.03.757.03 1.12.03.365 0 .728-.03 1.092-.06.363-.03.727-.091 1.09-.152.364-.06.728-.12 1.061-.242.364-.091.697-.182 1.061-.303.333-.091.697-.243 1.03-.364.334-.151.667-.273 1-.454.334-.182.667-.334.97-.516.334-.151.637-.363.97-.545.333-.182.636-.394.97-.576.333-.182.636-.394.94-.576.302-.212.635-.394.938-.606.304-.212.637-.394.97-.606l.303-.182.152.091 2.182 1.455-2.213-.576c-.212.243-.424.485-.666.727-.273.273-.576.546-.849.819-.303.242-.606.515-.94.727-.333.242-.636.455-1 .667-.666.424-1.393.788-2.15 1.09-.364.152-.758.304-1.122.425-.394.121-.758.242-1.152.333-.394.091-.788.182-1.181.243-.394.06-.788.09-1.182.151-.788.03-1.606.03-2.394-.09-.394-.061-.788-.122-1.182-.213-.394-.09-.758-.212-1.121-.333a10.463 10.463 0 0 1-1.849-.91s-2.091.304-1.242 1.88c.848 1.575 2.12 1.424 1.515 3.272-.425 1-1.03 1.97-1.697 2.88-1.394 1.878-3.576 3.545-3.364 4.545 9.91 12.212 32.244 10.515 40.729-.394-.122-1.576-2.606-2.334-4.334-6.182.485.151 1.212.364 1.212.333 0-.03-2.06-3.364-2.151-3.697l1.333.091s-1.757-2.182-1.818-2.394l1.788-.242s-2.243-2.576-2.273-2.788l2.273.363-2.485-3h1.182l-1.394-2.03c-.243-.091-.485-.152-.728-.212l-.909-.273c-3.394-1.06-6.606-2.03-9.697-3.97-4.333-2.697-8.212-6-11.122-8.576l-5.848-2.849c-5.607-.424-10.88-.272-14.092.364l2.061-3.515-3.152 3.788c-.212-.06-.272-.182-.272-.182l.212-4.667-1 4.212c-.303-.151-.667-.212-1.03-.212A2.509 2.509 0 0 0 5.09 26.85c0 1.273.94 2.334 2.182 2.485l-2.152 4.364Z"/><path fill="#FFCC86" d="M8.637 24.486a2.813 2.813 0 0 0-1-.212 2.509 2.509 0 0 0-2.516 2.515c0 1.212.88 2.242 2.03 2.485h.061c.758-.243 2.273-2.273 2.03-3.546a2.807 2.807 0 0 0-.605-1.242Z"/><path fill="#FDD321" d="M30.728 21.243c-.454-1.242-.333-2.848.303-4.364.91-2.09 2.637-3.485 4.273-3.485.334 0 .637.061.94.182.94-.848 2.03-1.545 3.242-2.03 6.698-2.667 16.486 2.09 19.001 8.667 1.212 3.182.849 6.667-.182 9.849-.848 2.606-3.94 6.364-2.788 9.212-.454-.121-10.03-3.09-12.697-4.788-4.273-2.667-8.122-5.94-11-8.485l-.092-.091-9.727-4.606a3.306 3.306 0 0 1-.334-.182c1.394 0 6.698.636 9.061.121"/><path fill="#FFF" d="M33.607 22.334a1.58 1.58 0 0 1-.697-.151c-.485-.212-.848-.606-1.09-1.213-.425-1.03-.304-2.454.272-3.788.758-1.727 2.182-2.939 3.485-2.939.243 0 .485.06.727.151.637.273 1.091.91 1.243 1.819.182.97.03 2.09-.455 3.151-.757 1.728-2.212 2.97-3.485 2.97Z"/><path fill="#192E45" d="M35.547 14.728c.182 0 .363.03.545.121.485.212.849.758.97 1.485.151.879.03 1.91-.424 2.879-.667 1.545-1.97 2.667-3.061 2.667-.182 0-.364-.03-.515-.091-.455-.182-.697-.606-.818-.94-.364-.909-.273-2.242.242-3.454.697-1.546 1.97-2.667 3.06-2.667m0-.91c-1.454 0-3.06 1.334-3.908 3.243-.637 1.425-.728 2.97-.273 4.152.273.697.727 1.182 1.303 1.455.273.12.576.181.909.181 1.455 0 3.06-1.333 3.879-3.242.515-1.152.667-2.364.485-3.425-.182-1.06-.728-1.818-1.515-2.151-.243-.152-.546-.212-.88-.212Z"/></g></svg>

Before

Width:  |  Height:  |  Size: 3.2 KiB

-1
View File
@@ -1 +0,0 @@
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867"><defs><clipPath id="SVGID_00000142168627081468672430000006527680084326249886_"><use xlink:href="#SVGID_1_"/></clipPath><linearGradient id="SVGID_00000088853459014864040730000009902632102805990829_" x1="536.6" x2="292.94" y1="1113.2" y2="64.084" gradientTransform="matrix(1,0,0,-1,0,788)" gradientUnits="userSpaceOnUse"><stop offset=".48" stop-color="#24ECC6" stop-opacity="0"/><stop offset=".994" stop-color="#24ECC6"/></linearGradient><linearGradient id="SVGID_00000075863372972845837890000016599907698185993344_" x1="759.68" x2="219.42" y1="79.312" y2="1003.2" gradientTransform="matrix(1,0,0,-1,0,788)" gradientUnits="userSpaceOnUse"><stop offset=".066" stop-color="#ABFFEF"/><stop offset=".45" stop-color="#CAC9FF"/><stop offset="1" stop-color="#6D4AFF"/></linearGradient><rect id="SVGID_1_" width="862" height="787"/></defs><g transform="matrix(.039294 0 0 .039294 3.7235e-7 1.4686)"><clipPath><use xlink:href="#SVGID_1_"/></clipPath><g clip-path="url(#SVGID_00000142168627081468672430000006527680084326249886_)"><path fill="#6851f6" fill-rule="evenodd" d="m346.1 740.3c32.8 59.3 116.9 62.6 154 5.9l346.7-528.4c36.8-56 1.6-131.2-65-138.8l-681.4-78.1c-72.7-8.3-124.4 68.9-89.1 132.9z" class="st1" clip-rule="evenodd"/><path fill="url(#SVGID_00000088853459014864040730000009902632102805990829_)" fill-rule="evenodd" d="m346.3 740.3c32.8 59.3 116.9 62.6 154 5.9l346.7-528.4c36.8-56 1.6-131.2-65-138.8l-681.4-78.2c-72.7-8.3-124.4 68.9-89 132.9z" clip-rule="evenodd"/><path fill="url(#SVGID_00000075863372972845837890000016599907698185993344_)" d="m396.4 638.7-30.8 46.3c-12.5 18.7-40.4 17.6-51.2-2.1l31.7 57.5c5.7 10.2 12.8 18.8 21.1 25.7 39.3 33 102.2 27.1 133-19.8l346.7-528.4c36.8-56 1.6-131.2-65-138.8l-681.5-78.2c-72.7-8.4-124.4 68.9-89.1 132.9l2.7 4.9 580.1 67.1c37 4.3 56.5 46 36 77.1z"/></g></g></svg>

Before

Width:  |  Height:  |  Size: 1.9 KiB