1
1
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2026-05-20 02:11:17 +00:00

style: Use correct format for buttons

This commit is contained in:
2026-05-18 17:32:55 -05:00
parent 7dda698d6a
commit 52d2965b0b
34 changed files with 158 additions and 104 deletions
+6
View File
@@ -248,6 +248,12 @@ p.pg\:image\:right img {
margin-left: 1em;
}
.content :where(h1):not(:where([class~=not-prose],[class~=not-prose] *)),
.content :where(h2):not(:where([class~=not-prose],[class~=not-prose] *)),
.content :where(h3):not(:where([class~=not-prose],[class~=not-prose] *)) {
color: var(--hx-color-primary-900)
}
.content :where(a):not(:where([class~=not-prose],
[class~=not-prose] *)) {
color:var(--hx-color-primary-800);
+8 -7
View File
@@ -10,19 +10,19 @@ cascade:
**Privacy Guides** is a socially motivated website that provides information for protecting your data security and privacy. We are a non-profit project with a mission to inform the public about the value of digital privacy, and about global government initiatives which aim to monitor your online activity. Our website is free of advertisements and not affiliated with any of the listed providers.
[Become a Member](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary data-portal="signup" }
[Homepage](https://www.privacyguides.org){ .card-link title=Homepage }
[Source Code](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" }
[Become a Member](https://donate.magicgrants.org/privacyguides)
[Homepage](https://www.privacyguides.org)
[Source Code](https://github.com/privacyguides/privacyguides.org)
{ .pg:buttons }
Privacy Guides is built by volunteers and staff members around the world. All changes to our recommendations and resources are reviewed by at least two [trusted](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all) individuals, and we work diligently to ensure our content is updated as quickly as possible to adapt to the ever-changing cybersecurity threat landscape.
In addition to our core team, many other people have made contributions to the project. You can too! We're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides).
[Job Openings](jobs/)
## Contact Us
[Join the Privacy Guides forum](https://discuss.privacyguides.net){ .md-button .md-button--primary }
[Join the Privacy Guides forum](https://discuss.privacyguides.net)
{ .pg:buttons }
The best way to get individual help is from our community on Discourse. If you notice an issue with our website, please open a discussion in the [Site Development](https://discuss.privacyguides.net/c/site-development/7) category on our forum. If you have a question about anything we cover, please ask it in the [Questions](https://discuss.privacyguides.net/c/privacy/questions/8) category on our forum.
@@ -31,7 +31,8 @@ The best way to get individual help is from our community on Discourse. If you n
Have a tip for us, or need to share some sensitive information? The best way to get in touch with us securely is via `@privacyguides.01` on Signal. This group account is monitored by [Jonah](https://discuss.privacyguides.net/u/jonah), [Niek](https://discuss.privacyguides.net/u/niek-de-wilde), [Em](https://discuss.privacyguides.net/u/em), and [Jordan](https://discuss.privacyguides.net/u/jordan).
[Chat on Signal](https://signal.me/#eu/zg9xcrIv5w-EtXt2FmTJgfWv01LmyTed8rpr7RDv35Mizq8ISZ9NJLmYtzsxI0Z4){ .md-button }
[Chat on Signal](https://signal.me/#eu/zg9xcrIv5w-EtXt2FmTJgfWv01LmyTed8rpr7RDv35Mizq8ISZ9NJLmYtzsxI0Z4)
{ .pg:buttons }
You may also email the entire team at <team@privacyguides.org>. This is a shared inbox that could be read by any [team member](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all), so please consider what sensitive information you share via email accordingly.
+6 -5
View File
@@ -6,10 +6,10 @@ description: The charitable mission of Privacy Guides relies on contributions fr
Support our mission to defend digital rights and spread the word about mass surveillance programs and other daily privacy invasions. You can help Privacy Guides researchers, activists, and maintainers create informative content, host private digital services, and protect privacy rights at a time when the world needs it most.
<!-- markdownlint-disable-next-line -->
[Become a Member](https://donate.magicgrants.org/privacyguides/membership){ .md-button .md-button--primary data-portal="signup" }
[Become a Member (Cryptocurrency)](https://donate.magicgrants.org/privacyguides/membership){ .md-button }
[One-Time Donation](https://donate.magicgrants.org/privacyguides/donate/privacyguides){ .md-button }
[Become a Member](https://donate.magicgrants.org/privacyguides/membership)
[Become a Member (Cryptocurrency)](https://donate.magicgrants.org/privacyguides/membership)
[One-Time Donation](https://donate.magicgrants.org/privacyguides/donate/privacyguides)
{ .pg:buttons }
*MAGIC Grants is our fiscal host, and their custom, open-source donation platform allows you to donate to our project with **Monero**, **Litecoin (MWEB)**, **Bitcoin**, or **debit/credit card**. You can also donate using [GitHub Sponsors](https://github.com/sponsors/privacyguides).*
@@ -49,7 +49,8 @@ The list of active members is updated when the site is built from our donation p
You can support us and share your passion for privacy by buying our merchandise from HelloTux.
[Buy on HelloTux.com](https://hellotux.com/privacyguides){ .md-button }
[Buy on HelloTux.com](https://hellotux.com/privacyguides)
{ .pg:buttons }
## Non-Financial Support
+2 -1
View File
@@ -5,7 +5,8 @@ description: We run a number of web services to test out features and promote co
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
[Report an issue](https://discuss.privacyguides.net/c/services/2){ .md-button .md-button--primary }
[Report an issue](https://discuss.privacyguides.net/c/services/2)
{ .pg:buttons }
## Discourse
+2 -1
View File
@@ -5,7 +5,8 @@ description: We self-host Umami to create a nice visualization of our traffic st
<!-- markdownlint-disable MD051 -->
We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below.
[View Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org){ .md-button .md-button--primary }
[View Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org)
{ .pg:buttons }
With this process:
@@ -117,9 +117,10 @@ Here are a few privacy-focused tools and services that can help you to organize
:page_with_curl: Use it as an alternative to Google Docs!
[More info](../../../tools/software/document-collaboration/index.md#cryptpad){ .md-button .md-button--primary }
[:octicons-home-16:](https://cryptpad.fr/){ .card-link title="Homepage" }
[:octicons-feed-star-16:](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/){ .card-link title="Our CryptPad review" }
[More info](../../../tools/software/document-collaboration/index.md#cryptpad)
[:octicons-home-16:](https://cryptpad.fr/)
[:octicons-feed-star-16:](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/)
{ .pg:buttons }
</div>
@@ -131,9 +132,10 @@ Here are a few privacy-focused tools and services that can help you to organize
:speech_balloon: Use it as an [alternative](../tip-improve-your-social-media-and-build-resilient-communities/) to commercial social media such as *X*, *Facebook*, *Instagram*, *Threads*, *TikTok*, or *Bluesky*.
[More info](../../../tools/software/social-networks/index.md#mastodon){ .md-button .md-button--primary }
[:octicons-home-16:](https://joinmastodon.org/){ .card-link title="Homepage" }
[:octicons-feed-star-16:](https://www.privacyguides.org/articles/2025/07/15/mastodon-privacy-and-security/){ .card-link title="Notes on Mastodon Privacy & Security" }
[More info](../../../tools/software/social-networks/index.md#mastodon)
[:octicons-home-16:](https://joinmastodon.org/)
[:octicons-feed-star-16:](https://www.privacyguides.org/articles/2025/07/15/mastodon-privacy-and-security/)
{ .pg:buttons }
</div>
@@ -145,8 +147,9 @@ Here are a few privacy-focused tools and services that can help you to organize
:loudspeaker: Use it as a privacy-preserving alternative to *Slack* or *Discord*.
[More info](../../../tools/software/social-networks/index.md#element){ .md-button .md-button--primary }
[:octicons-home-16:](https://element.io/){ .card-link title="Homepage" }
[More info](../../../tools/software/social-networks/index.md#element)
[:octicons-home-16:](https://element.io/)
{ .pg:buttons }
</div>
@@ -158,7 +161,8 @@ Here are a few privacy-focused tools and services that can help you to organize
:video_camera: Use it to share videos with your community free from *YouTube*'s control.
[:octicons-home-16: Homepage](../../../tools/software/social-networks/index.md#peertube){ .md-button .md-button--primary }
[:octicons-home-16: Homepage](../../../tools/software/social-networks/index.md#peertube)
{ .pg:buttons }
</div>
+3 -2
View File
@@ -4,5 +4,6 @@
**Daniel** is a founding team member of Privacy Guides and part of its [executive committee](https://www.privacyguides.org/en/about/#executive-committee).
[:simple-mastodon: @dngray@mastodon.social](https://mastodon.social/@dngray "@dngray@mastodon.social"){ .md-button rel=me }
[:simple-bluesky: dngray.bsky.social](https://bsky.app/profile/dngray.bsky.social "@dngray.bsky.social"){ .md-button rel=me }
[:simple-mastodon: @dngray@mastodon.social](https://mastodon.social/@dngray "@dngray@mastodon.social")
[:simple-bluesky: dngray.bsky.social](https://bsky.app/profile/dngray.bsky.social "@dngray.bsky.social")
{ .pg:buttons }
+2 -1
View File
@@ -29,4 +29,5 @@ schema:
Em is passionate about digital rights, privacy advocacy, solid security, and code for the public good. In her free time, you can find Em on Mastodon giving privacy tips or boosting photos of cats and moss.
[:simple-mastodon: @Em0nM4stodon@infosec.exchange](https://infosec.exchange/@Em0nM4stodon "@Em0nM4stodon@infosec.exchange"){ .md-button rel=me }
[:simple-mastodon: @Em0nM4stodon@infosec.exchange](https://infosec.exchange/@Em0nM4stodon "@Em0nM4stodon@infosec.exchange")
{ .pg:buttons }
+3 -2
View File
@@ -4,5 +4,6 @@
[**Freddy**](https://freddy.lol) is a founding team member of Privacy Guides and part of its [executive committee](https://www.privacyguides.org/en/about/#executive-committee). He writes in American English reluctantly.
[:simple-mastodon: @freddy@social.lol](https://social.lol/@freddy "@freddy@social.lol"){ .md-button rel=me }
[:simple-bluesky: @freddy.lol](https://bsky.app/profile/freddy.lol "@freddy.lol"){ .md-button rel=me }
[:simple-mastodon: @freddy@social.lol](https://social.lol/@freddy "@freddy@social.lol")
[:simple-bluesky: @freddy.lol](https://bsky.app/profile/freddy.lol "@freddy.lol")
{ .pg:buttons }
+3 -2
View File
@@ -31,5 +31,6 @@ schema:
[**Jonah Aragon**](https://www.jonaharagon.com) is *Privacy Guides'* editor and Program Director. With over a decade of technical writing experience, his role includes researching and writing for Privacy Guides. He also runs Triplebit, a non-profit ISP behind many privacy-related tools.
[:simple-mastodon: @jonah@neat.computer](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){ .md-button rel=me }
[:simple-bluesky: @jonaharagon.com](https://bsky.app/profile/jonaharagon.com "@jonaharagon.com"){ .md-button rel=me }
[:simple-mastodon: @jonah@neat.computer](https://mastodon.neat.computer/@jonah "@jonah@neat.computer")
[:simple-bluesky: @jonaharagon.com](https://bsky.app/profile/jonaharagon.com "@jonaharagon.com")
{ .pg:buttons }
+2 -1
View File
@@ -4,4 +4,5 @@
**Niek** is a founding team member of Privacy Guides and part of the [executive committee](https://www.privacyguides.org/en/about/#executive-committee). His day-to-day concerns for Privacy Guides entail both research and outreach.
[:simple-mastodon: @blacklight447@mastodon.social](https://mastodon.social/@blacklight447 "@blacklight447@mastodon.social"){ .md-button rel=me }
[:simple-mastodon: @blacklight447@mastodon.social](https://mastodon.social/@blacklight447 "@blacklight447@mastodon.social")
{ .pg:buttons }
+3 -2
View File
@@ -54,8 +54,9 @@ But you shouldn't trust anyone else either.
It was built from the ground up respecting the principles of [Privacy by Design](https://en.wikipedia.org/wiki/Privacy_by_design). All content kept in CryptPad is secured using solid end-to-end encryption, meaning that only the intended recipients can access the content. CryptPad itself cannot read, scan, or utilize your content in any way.
[:octicons-home-16: Website](https://cryptpad.org/){ .md-button }
[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" }
[:octicons-home-16: Website](https://cryptpad.org/)
[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/)
{ .pg:buttons }
CryptPad is developed by a team from the French software company [XWiki](https://www.xwiki.com). Because [CryptPad is open-source](https://github.com/cryptpad), anyone can add contributions to it, inspect its code, or submit feature recommendations.
+3 -2
View File
@@ -37,8 +37,9 @@ review:
**EasyOptOuts.com** is a $19.99/year [people-search site removal service](https://www.privacyguides.org/en/data-broker-removals/) which will search a number of different data broker sites and automatically submit opt-out requests on your behalf. They will perform the first search and removal process immediately, and then re-run the process every 4 months in case your data shows up on new sites over time.<!-- more -->
[:octicons-home-16: Homepage](https://easyoptouts.com){ .md-button }
[:octicons-eye-16:](https://easyoptouts.com/privacy){ .card-link title="Privacy Policy" }
[:octicons-home-16: Homepage](https://easyoptouts.com)
[:octicons-eye-16:](https://easyoptouts.com/privacy)
{ .pg:buttons }
## Background
+6 -5
View File
@@ -36,11 +36,12 @@ review:
Search the App Store for "Tor Browser" and you'll be flooded with a variety of ways to connect to the Tor network from your iPhone. However, there's only one solution officially [endorsed](https://support.torproject.org/tormobile/tormobile-3/) by the Tor Project themselves: **Onion Browser**.<!-- more -->
[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button }
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" }
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute }
[:octicons-home-16: Homepage](https://onionbrowser.com)
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy)
[:octicons-info-16:](https://onionbrowser.com/faqs)
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser)
[:octicons-heart-16:](https://onionbrowser.com/donate)
{ .pg:buttons }
Onion Browser is an open-source app created by Mike Tigas, who has worked closely with Tor Project in the past and was previously an investigative journalist at ProPublica (he is currently an advisor at the FTC). His company still maintains the app, although lately it is primarily [developed](https://github.com/OnionBrowser/OnionBrowser/graphs/contributors) by other maintainers.
@@ -42,8 +42,9 @@ Based in Hanover, Germany, **Tuta** is an email service with a focus on security
Free accounts start with 1 GB of storage.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/email/#tuta){ .md-button .md-button--primary }
[:octicons-home-16:](https://tuta.com){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/email/#tuta)
[:octicons-home-16:](https://tuta.com)
{ .pg:buttons }
</div>
@@ -57,8 +58,9 @@ Based in Geneva, Switzerland, **Proton Mail** is an email service with a focus o
The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/email/#proton-mail){ .md-button .md-button--primary }
[:octicons-home-16:](https://proton.me){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/email/#proton-mail)
[:octicons-home-16:](https://proton.me)
{ .pg:buttons }
</div>
@@ -78,8 +80,9 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/document-collaboration/#cryptpad){ .md-button .md-button--primary }
[:octicons-home-16:](https://cryptpad.org){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/document-collaboration/#cryptpad)
[:octicons-home-16:](https://cryptpad.org)
{ .pg:buttons }
</div>
@@ -95,8 +98,9 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
**Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/document-collaboration/#nextcloud){ .md-button .md-button--primary }
[:octicons-home-16:](https://nextcloud.com){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/document-collaboration/#nextcloud)
[:octicons-home-16:](https://nextcloud.com)
{ .pg:buttons }
</div>
@@ -110,8 +114,9 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
Web-based editors aren't for everyone. If you need a full-fledged office suite that runs locally on your computer, **LibreOffice** is a fantastic alternative to Microsoft Office.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/office-suites/#libreoffice){ .md-button .md-button--primary }
[:octicons-home-16:](https://libreoffice.org){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/office-suites/#libreoffice)
[:octicons-home-16:](https://libreoffice.org)
{ .pg:buttons }
</div>
@@ -130,8 +135,9 @@ Headquartered and developed in the Netherlands, Startpage is one great alternati
**Startpage** is a private search engine. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. However, unlike the name suggests, the feature should not be relied upon for *total* anonymity.
[:octicons-info-16: Homepage](https://www.privacyguides.org/en/search-engines/#startpage){ .md-button .md-button--primary }
[:octicons-home-16:](https://startpage.com){ .card-link title="Homepage" }
[:octicons-info-16: Homepage](https://www.privacyguides.org/en/search-engines/#startpage)
[:octicons-home-16:](https://startpage.com)
{ .pg:buttons }
</div>
@@ -151,8 +157,9 @@ One of our [recommended browsers](https://www.privacyguides.org/en/desktop-brows
**Mullvad Browser** is a version of Tor Browser with Tor network integrations removed. It aims to provide to VPN users Tor Browser's anti-fingerprinting browser technologies, which are key protections against mass surveillance programs. It is developed by the Tor Project and distributed by Mullvad, although it does *not* require the use of Mullvad's VPN.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser){ .md-button .md-button--primary }
[:octicons-home-16:](https://mullvad.net/en/browser){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser)
[:octicons-home-16:](https://mullvad.net/en/browser)
{ .pg:buttons }
</div>
@@ -168,8 +175,9 @@ Mapping and location apps like Google Maps can track your every move, and that d
Based in Estonia, **Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/maps/#organic-maps){ .md-button .md-button--primary }
[:octicons-home-16:](https://organicmaps.app){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/maps/#organic-maps)
[:octicons-home-16:](https://organicmaps.app)
{ .pg:buttons }
</div>
@@ -181,8 +189,9 @@ Based in Estonia, **Organic Maps** is an open source, community-developed map di
Based in the Netherlands, **OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data.
[:octicons-home-16: More Info](https://www.privacyguides.org/en/maps/#osmand){ .md-button .md-button--primary }
[:octicons-home-16:](https://osmand.net){ .card-link title="Homepage" }
[:octicons-home-16: More Info](https://www.privacyguides.org/en/maps/#osmand)
[:octicons-home-16:](https://osmand.net)
{ .pg:buttons }
</div>
@@ -196,8 +205,9 @@ Based in the Netherlands, **OsmAnd** is an offline map and navigation applicatio
**KeePassXC** is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal of extending and improving it with new features and bug fixes to provide a feature-rich, cross-platform, and modern open-source password manager.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/passwords/#keepassxc){ .md-button .md-button--primary }
[:octicons-home-16:](https://keepassxc.org){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/passwords/#keepassxc)
[:octicons-home-16:](https://keepassxc.org)
{ .pg:buttons }
</div>
@@ -211,8 +221,9 @@ Based in the Netherlands, **OsmAnd** is an offline map and navigation applicatio
**Proton Pass** is an open-source, end-to-end encrypted password manager developed by the Swiss company Proton AG, the team behind Proton Mail. It securely stores your login credentials, generates unique email aliases, and supports and stores passkeys.
[:octicons-home-16: More Info](https://www.privacyguides.org/en/passwords/#proton-pass){ .md-button .md-button--primary }
[:octicons-home-16:](https://proton.me/pass){ .card-link title="Homepage" }
[:octicons-home-16: More Info](https://www.privacyguides.org/en/passwords/#proton-pass)
[:octicons-home-16:](https://proton.me/pass)
{ .pg:buttons }
</div>
@@ -232,8 +243,9 @@ Element is based in the United Kingdom, which is of course no longer in the Euro
Messages and files shared in private rooms (those which require an invite) are by default E2EE, as are one-to-one voice and video calls.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#element){ .md-button .md-button--primary }
[:octicons-home-16:](https://element.io){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#element)
[:octicons-home-16:](https://element.io)
{ .pg:buttons }
</div>
@@ -247,8 +259,9 @@ Another open-source option from the United Kingdom, SimpleX chat has very strong
**SimpleX Chat** is an instant messenger that doesn't depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against censorship.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#simplex-chat){ .md-button .md-button--primary }
[:octicons-eye-16:](https://simplex.chat){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#simplex-chat)
[:octicons-eye-16:](https://simplex.chat)
{ .pg:buttons }
</div>
@@ -262,8 +275,9 @@ Briar is an open source project not legally incorporated in any jurisdiction, al
**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network, making it an effective tool at circumventing censorship. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briars local mesh mode can be useful when internet availability is a problem.
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#briar){ .md-button .md-button--primary }
[:octicons-home-16:](https://briarproject.org){ .card-link title="Homepage" }
[:octicons-info-16: More Info](https://www.privacyguides.org/en/real-time-communication/#briar)
[:octicons-home-16:](https://briarproject.org)
{ .pg:buttons }
</div>
@@ -31,9 +31,11 @@ The **Tor** network is a group of volunteer-operated servers that allows you to
The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page:
[Tor Browser Info :material-arrow-right-drop-circle:](../../software/tor/index.md){ .md-button .md-button--primary }
[Tor Browser Info :material-arrow-right-drop-circle:](../../software/tor/index.md)
{ .pg:buttons }
[Detailed Tor Overview :material-arrow-right-drop-circle:](../../../wiki/advanced/tor-overview/index.md){ .md-button }
[Detailed Tor Overview :material-arrow-right-drop-circle:](../../../wiki/advanced/tor-overview/index.md)
{ .pg:buttons }
You can access the Tor network using other tools; making this determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile.
@@ -79,7 +81,8 @@ People who are censored can use Snowflake proxies to connect to the Tor network.
You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface.
[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button }
[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html)
{ .pg:buttons }
Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours.
@@ -17,10 +17,10 @@ The mobile devices listed here provide a long lifespan of guaranteed security up
</div>
[Recommended Android Distributions :material-arrow-right-drop-circle:](../../os/android/distributions/index.md)
{ .md-button .md-button--primary }
{ .pg:buttons }
[Details about Android Security :material-arrow-right-drop-circle:](../../os/android/_index.md#security-protections)
{ .md-button }
{ .pg:buttons }
> [!WARNING]
> End-of-life devices (such as GrapheneOS's "extended support" devices) do not have full security patches (firmware updates) due to the OEM discontinuing support. These devices cannot be considered completely secure regardless of installed software.
+4 -4
View File
@@ -14,7 +14,7 @@ description: Our advice for replacing privacy-invasive default Android features
The **Android Open Source Project** (AOSP) is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features.
[General Android Overview](../../../wiki/os/android/index.md)
{ .md-button .md-button--primary }
{ .pg:buttons }
## Our Advice
@@ -23,12 +23,12 @@ The **Android Open Source Project** (AOSP) is an open-source mobile operating sy
There are many methods of obtaining apps on Android while avoiding Google Play. Whenever possible, try using one of these methods before getting your apps from non-private sources:
[Obtaining Applications](./obtaining-apps/index.md)
{ .md-button }
{ .pg:buttons }
There are also many private alternatives to the apps that come pre-installed on your phone, such as the camera app. Besides the Android apps we recommend throughout this site in general, we've created a list of system utilities specific to Android which you might find useful.
[General App Recommendations](./general-apps/index.md)
{ .md-button }
{ .pg:buttons }
### Install a Custom Distribution
@@ -39,7 +39,7 @@ This problem could be solved by using an alternative Android distribution, commo
Ideally, when choosing a custom Android distribution, you should make sure that it upholds the Android security model. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria:
[Recommended Distributions](distributions/index.md)
{ .md-button }
{ .pg:buttons }
### Avoid Root
@@ -53,7 +53,8 @@ Once you have opted-out of all of these sites for the first time, it's best to w
Otherwise, privacy journalist Yael Grauer has compiled an excellent list of data broker sites with direct links to their search tools and opt-out pages. You can take some time to go through each site to determine whether they have your information, and remove it:
[:simple-github: Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List){ .md-button }
[:simple-github: Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
{ .pg:buttons }
If you don't use an automatic scanner to find results about you, consider setting a reminder to re-do this process every 3, 6, or 12 months depending on your risk level and the amount of personal data you have out there. Unfortunately, it is common for your data to re-appear over time or show up on brand-new people search sites even after you opt out.
@@ -15,7 +15,7 @@ title: Cryptocurrency
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
[Making Private Payments](../../../wiki/advanced/payments/index.md)
{ .md-button }
{ .pg:buttons }
> [!CAUTION]
> Many if not most cryptocurrency projects are scams. Make transactions carefully with only projects you trust.
@@ -59,7 +59,7 @@ For maximum privacy (even with a self-custody wallet), you should run your own M
### Buying Monero
[General tips for acquiring Monero](../../../wiki/advanced/payments/index.md#acquisition)
{ .md-button }
{ .pg:buttons }
There are numerous centralized exchanges (CEX) as well as P2P marketplaces where you can buy and sell Monero. Some of them require identifying yourself (KYC) to comply with anti-money laundering regulations. However, due to Monero's privacy features, the only thing known to the seller is *that* you bought Monero, but not how much you own or where you spend it (after it leaves the exchange). Some reputable places to buy Monero include:
@@ -69,7 +69,7 @@ The app offers multiple ways to erase metadata from images. Namely:
On iOS and macOS, you can remove image metadata without using any third-party apps by creating a [**shortcut**](https://apps.apple.com/app/id915249334) for this purpose. Here is an example shortcut you can download to use as is:
[:material-tag-minus: Clean Image Metadata](https://icloud.com/shortcuts/fb774ddb7b5b4296871776c67ac0fff9)
{ .md-button }
{ .pg:buttons }
You can also use it as a model for your own shortcut; just make sure that the **Preserve Metadata** option under the **Convert** action is unchecked. Once added, you can access the shortcut in the share sheet that appears when you select the :octicons-share-24: Share button. You can select multiple images and invoke the shortcut to remove their metadata all at once.
@@ -16,7 +16,7 @@ When using end-to-end encryption (E2EE) technology like OpenPGP, email will stil
OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed: [How do I protect my private keys?](../../../wiki/basics/email-security/index.md#how-do-i-protect-my-private-keys) Consider using a medium that provides forward secrecy:
[Real-time Communication](../../services/messengers/index.md)
{ .md-button }
{ .pg:buttons }
</details>
+1 -2
View File
@@ -10,9 +10,8 @@ description: Protect your internet browsing from prying eyes by using the Tor ne
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
[Detailed Tor Overview :material-arrow-right-drop-circle:](../../../wiki/advanced/tor-overview/index.md)
{ .md-button .md-button--primary }
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor)
{ .md-button }
{ .pg:buttons }
> [!TIP]
> Before connecting to Tor, please ensure you've read our [overview](../../../wiki/advanced/tor-overview/index.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](../../services/vpn/index.md), but you have to do so **properly** to avoid decreasing your anonymity.
+2 -1
View File
@@ -299,7 +299,8 @@ graph TB
Encrypted DNS with a third party should only be used to get around redirects and basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences, or you're interested in a provider that does some rudimentary filtering.
[List of recommended DNS servers](../../../tools/services/dns/index.md){ .md-button }
[List of recommended DNS servers](../../../tools/services/dns/index.md)
{ .pg:buttons }
## What is DNSSEC?
+2 -1
View File
@@ -74,7 +74,8 @@ With cryptocurrency there are two forms of wallets: custodial wallets and self-c
Acquiring [cryptocurrencies](../../../tools/software/cryptocurrency/index.md) like Monero privately can be difficult. P2P marketplaces (platforms which facilitate trades between people) are one option, though the user experience typically suffers. If using an exchange which requires KYC is acceptable for you as long as subsequent transactions can't be traced, it's much easier to purchase Monero on a centralized exchange or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own self-custody wallet to use privately from that point forward.
[Recommended places to buy Monero](../../../tools/software/cryptocurrency/index.md#buying-monero){ .md-button }
[Recommended places to buy Monero](../../../tools/software/cryptocurrency/index.md#buying-monero)
{ .pg:buttons }
If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall.
+6 -5
View File
@@ -12,11 +12,12 @@ description: Tor is a free to use, decentralized network designed for using the
Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation}
[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" }
[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
[:octicons-home-16:](https://torproject.org)
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion)
[:octicons-info-16:](https://tb-manual.torproject.org)
[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor)
[:octicons-heart-16:](https://donate.torproject.org)
{ .pg:buttons }
## Safely Connecting to Tor
@@ -35,7 +35,8 @@ The most common way to create a new account is by an email address and password.
You will be responsible for managing your login credentials. For added security, you can set up [MFA](../multi-factor-authentication/index.md) on your accounts.
[Recommended password managers](../../../tools/software/passwords/index.md){ .md-button }
[Recommended password managers](../../../tools/software/passwords/index.md)
{ .pg:buttons }
#### Email aliases
@@ -43,7 +44,8 @@ If you don't want to give your real email address to a service, you have the opt
Should a service get hacked, you might start receiving phishing or spam emails to the address you used to sign up. Using unique aliases for each service can assist in identifying exactly what service was hacked.
[Recommended email aliasing services](../../../tools/services/email-aliasing/index.md){ .md-button }
[Recommended email aliasing services](../../../tools/services/email-aliasing/index.md)
{ .pg:buttons }
### "Sign in with..." (OAuth)
+3 -1
View File
@@ -69,7 +69,9 @@ Some threats can't be protected against by your internal components alone. Many
Hardware keys are devices that use strong cryptography to authenticate you to a device or account. The idea is that because they can not be copied, you can use them to secure accounts in such a way that they can only be accessed with physical possession of the key, eliminating many remote attacks.
[Recommended Hardware Keys :material-arrow-right-drop-circle:](../../../tools/hardware/security-keys/index.md){ .md-button .md-button--primary } [Learn More about Hardware Keys :material-arrow-right-drop-circle:](../multi-factor-authentication/index.md#hardware-security-keys){ .md-button }
[Recommended Hardware Keys :material-arrow-right-drop-circle:](../../../tools/hardware/security-keys/index.md)
[Learn More about Hardware Keys :material-arrow-right-drop-circle:](../multi-factor-authentication/index.md#hardware-security-keys)
{ .pg:buttons }
### Camera/Microphone
@@ -111,7 +111,8 @@ If you have to use email for MFA, make sure that the email account itself is sec
If you use SMS MFA, use a carrier who will not switch your phone number to a new SIM card without account access, or use a dedicated VoIP number from a provider with similar security to avoid a [SIM swap attack](https://en.wikipedia.org/wiki/SIM_swap_scam).
[MFA tools we recommend](../../../tools/software/multi-factor-authentication/index.md){ .md-button }
[MFA tools we recommend](../../../tools/software/multi-factor-authentication/index.md)
{ .pg:buttons }
## More Places to Set Up MFA
@@ -148,7 +148,8 @@ The best way to store your passwords is by using a password manager. They allow
There are many good options to choose from, both cloud-based and local. Choose one of our recommended password managers and use it to establish strong passwords across all of your accounts. We recommend securing your password manager with a [diceware passphrase](#diceware-passphrases) comprised of at least seven words.
[List of recommended password managers](../../../tools/software/passwords/index.md){ .md-button }
[List of recommended password managers](../../../tools/software/passwords/index.md)
{ .pg:buttons }
> [!IMPORTANT]
> When using [TOTP codes as multifactor authentication](../multi-factor-authentication/index.md#time-based-one-time-password-totp), the best security practice is to keep your TOTP codes in a [separate app](../../../tools/software/multi-factor-authentication/index.md).
+4 -2
View File
@@ -7,7 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn){ .md-button }
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn)
{ .pg:buttons }
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../../advanced/dns-overview/index.md#why-shouldnt-i-use-encrypted-dns).
@@ -78,7 +79,8 @@ Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/
You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. <mark>Privacy Guides does not make money from recommending external products, and never uses affiliate programs.</mark>
[Our VPN Recommendations](../../../tools/services/vpn/index.md){ .md-button }
[Our VPN Recommendations](../../../tools/services/vpn/index.md)
{ .pg:buttons }
## Modern VPN Alternatives
@@ -32,7 +32,8 @@ Many people get the concepts of **privacy**, **security**, and **anonymity** con
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../../../tools/_index.md) you use.
[:material-book-outline: Learn More About Threat Modeling](../threat-modeling/index.md){ .md-button }
[:material-book-outline: Learn More About Threat Modeling](../threat-modeling/index.md)
{ .pg:buttons }
## Privacy vs. Secrecy
+6 -4
View File
@@ -9,11 +9,13 @@ robots: nofollow, max-snippet:-1, max-image-preview:large
The **Android Open Source Project** is a secure mobile operating system featuring strong [app sandboxing](https://source.android.com/security/app-sandbox), [Verified Boot](https://source.android.com/security/verifiedboot) (AVB), and a robust [permission](https://developer.android.com/guide/topics/permissions/overview) control system.
[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage }
[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation}
[:octicons-code-16:](https://cs.android.com/android/platform/superproject/main){ .card-link title="Source Code" }
[:octicons-home-16:](https://source.android.com)
[:octicons-info-16:](https://source.android.com/docs)
[:octicons-code-16:](https://cs.android.com/android/platform/superproject/main)
{ .pg:buttons }
[Our Android Advice :material-arrow-right-drop-circle:](../../../tools/os/android/_index.md){ .md-button .md-button--primary }
[Our Android Advice :material-arrow-right-drop-circle:](../../../tools/os/android/_index.md)
{ .pg:buttons }
## Security Protections
+2 -1
View File
@@ -7,7 +7,8 @@ description: Linux is an open-source, privacy-focused desktop operating system a
Our website generally uses the term “Linux” to describe **desktop** Linux distributions. Other operating systems which also use the Linux kernel such as ChromeOS, Android, and Qubes OS are not discussed on this page.
[Our Linux Recommendations :material-arrow-right-drop-circle:](../../../tools/os/desktop/index.md){ .md-button }
[Our Linux Recommendations :material-arrow-right-drop-circle:](../../../tools/os/desktop/index.md)
{ .pg:buttons }
## Security Notes