mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-28 06:11:03 +00:00
Markdown conversion (#529)
Co-authored-by: Daniel Gray <dng@disroot.org>
This commit is contained in:
@@ -4,7 +4,7 @@ items:
|
||||
- type: link
|
||||
title: Cloud Storage
|
||||
icon: fad fa-cloud
|
||||
file: _evergreen/cloud.html
|
||||
file: _pages/providers/cloud.md
|
||||
- type: link
|
||||
title: DNS Servers
|
||||
icon: fad fa-map-signs
|
||||
@@ -16,7 +16,7 @@ items:
|
||||
- type: link
|
||||
title: Search Engines
|
||||
icon: fad fa-search-location
|
||||
file: _evergreen/search-engines.html
|
||||
file: _pages/providers/search-engines.md
|
||||
- type: link
|
||||
title: Social Networks
|
||||
icon: fad fa-thumbs-up
|
||||
|
@@ -4,7 +4,7 @@ items:
|
||||
- type: link
|
||||
title: Browsers
|
||||
icon: fad fa-browser
|
||||
file: _evergreen/browsers.html
|
||||
file: _evergreen/browsers.md
|
||||
- type: link
|
||||
title: Operating Systems (Legacy)
|
||||
icon: fad fa-compact-disc
|
||||
@@ -47,7 +47,7 @@ items:
|
||||
- type: link
|
||||
title: Real-Time Communication
|
||||
icon: fad fa-comments-alt
|
||||
file: _evergreen/real-time-communication.html
|
||||
file: _pages/software/real-time-communication.md
|
||||
- type: link
|
||||
title: Self-Contained Networks
|
||||
icon: fad fa-chart-network
|
||||
@@ -55,4 +55,4 @@ items:
|
||||
- type: link
|
||||
title: Video Streaming
|
||||
icon: fad fa-video
|
||||
file: _evergreen/video-streaming.html
|
||||
file: _pages/software/video-streaming.md
|
||||
|
@@ -4,4 +4,4 @@ items:
|
||||
- type: link
|
||||
title: Android
|
||||
icon: fab fa-android
|
||||
file: _evergreen/android.html
|
||||
file: _evergreen/android.md
|
@@ -4,4 +4,4 @@ items:
|
||||
- type: link
|
||||
title: Threat Modeling
|
||||
icon: fad fa-bullseye-arrow
|
||||
file: _evergreen/threat-modeling.html
|
||||
file: _evergreen/threat-modeling.md
|
||||
|
@@ -2,14 +2,14 @@ title: Orbot
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/orbot.svg
|
||||
description: |
|
||||
<strong>Orbot</strong> is a free proxy app that routes your connections through the Tor Network.
|
||||
**Orbot** is a free proxy app that routes your connections through the Tor Network.
|
||||
|
||||
Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using the <a href="https://developer.android.com/reference/android/net/VpnService">VpnService</a> and can be used with the VPN killswitch (⚙️ Settings → Network & internet → VPN → ⚙️ → Block connections without VPN).
|
||||
Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using the [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch (⚙️ Settings → Network & internet → VPN → ⚙️ → Block connections without VPN).
|
||||
|
||||
For resistance against traffic analysis attacks, consider enabling <em>Isolate Destination Address</em> ( ⁝ →Settings → Connectivity). This will use a completely different Tor Circuit (different middle relay and exit nodes) for every domain you connect to.
|
||||
For resistance against traffic analysis attacks, consider enabling *Isolate Destination Address* ( ⁝ →Settings → Connectivity). This will use a completely different Tor Circuit (different middle relay and exit nodes) for every domain you connect to.
|
||||
|
||||
<h4>Notes</h4>
|
||||
Orbot is often outdated on the Guardian Project's <a href="https://guardianproject.info/fdroid">F-Droid repository</a> and <a href="https://play.google.com/store/apps/details?id=org.torproject.android">Google Play</a> so consider downloading directly from the <a href="https://github.com/guardianproject/orbot">GitHub repository</a> instead.
|
||||
#### Notes
|
||||
Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot) instead.
|
||||
|
||||
All versions are signed using the same signature so they should be compatible with each other.
|
||||
website: 'https://guardianproject.info/apps/org.torproject.android'
|
||||
|
@@ -2,11 +2,11 @@ title: Shelter
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/shelter.svg
|
||||
description: |
|
||||
<strong>Shelter</strong> is an app that helps you leverage the Android work profile to isolate other apps.
|
||||
**Shelter** is an app that helps you leverage the Android work profile to isolate other apps.
|
||||
|
||||
Shelter supports blocking contact search cross profiles and sharing files across profiles via the default file manager (<a href="https://source.android.com/devices/architecture/modular-system/documentsui">DocumentsUI</a>).
|
||||
Shelter supports blocking contact search cross profiles and sharing files across profiles via the default file manager ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)).
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
CalyxOS includes a device controller so we recommend using their built in work profile instead.
|
||||
website: 'https://gitea.angry.im/PeterCxy/Shelter'
|
||||
downloads:
|
||||
|
@@ -2,20 +2,19 @@ title: Auditor
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/auditor.svg
|
||||
description: |
|
||||
<strong>Auditor</strong> is an app which leverages hardware security features to provide device integrity monitoring for <a href="https://attestation.app/about#device-support">supported devices</a>. It currently works with GrapheneOS and the stock operating system. It performs attestation and intrusion detection by:
|
||||
<ul>
|
||||
<li>Using a <a href="https://en.wikipedia.org/wiki/Trust_on_first_use">Trust On First Use (TOFU)</a> model between an <em>auditor</em> and <em>auditee</em>, the pair establish a private key in the <a href="https://source.android.com/security/keystore/">hardware-backed keystore</a> of the <em>Auditor</em>.</li>
|
||||
<li>The <em>auditor</em> can either be another instance of the Auditor app or the <a href="https://attestation.app">Remote Attestation Service</a>.</li>
|
||||
<li>The <em>auditor</em> records the current state and configuration of the <em>auditee</em>.</li>
|
||||
<li>Should tampering with the operating system of the <em>auditee</em> after the pairing is complete, the auditor will be aware of the change in the device state and configurations.</li>
|
||||
<li>The user will be alerted to the change.</li>
|
||||
</ul>
|
||||
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). It currently works with GrapheneOS and the stock operating system. It performs attestation and intrusion detection by:
|
||||
|
||||
* Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an *auditor* and *auditee*, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the *Auditor*.
|
||||
* The *auditor* can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app).
|
||||
* The *auditor* records the current state and configuration of the *auditee*.
|
||||
* Should tampering with the operating system of the *auditee* after the pairing is complete, the auditor will be aware of the change in the device state and configurations.
|
||||
* The user will be alerted to the change.
|
||||
|
||||
No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.
|
||||
|
||||
If your <a href="/threat-modeling/">threat model</a> requires privacy you could consider using Orbot or a VPN to hide your IP address from the attestation service.
|
||||
If your [threat model](/threat-modeling/) requires privacy you could consider using Orbot or a VPN to hide your IP address from the attestation service.
|
||||
|
||||
To make sure that your hardware and operating system is genuine, <a href="https://grapheneos.org/install/web#verifying-installation">perform local attestation</a> immediately after the device has been installed and prior to any internet connection.
|
||||
To make sure that your hardware and operating system is genuine, [perform local attestation](https://grapheneos.org/install/web#verifying-installation) immediately after the device has been installed and prior to any internet connection.
|
||||
|
||||
website: 'https://attestation.app'
|
||||
privacy_policy: 'https://attestation.app/privacy-policy'
|
||||
|
@@ -3,15 +3,15 @@ type: Recommendation
|
||||
logo: /assets/img/android/grapheneos.svg
|
||||
logo_dark: /assets/img/android/grapheneos-dark.svg
|
||||
description: |
|
||||
<strong>GrapheneOS</strong> is the best choice when it comes to privacy and security.
|
||||
**GrapheneOS** is the best choice when it comes to privacy and security.
|
||||
|
||||
GrapheneOS has a lot of security hardening and privacy improvements. It has a <a href="https://github.com/GrapheneOS/hardened_malloc">hardened memory allocator</a>, network and sensor permissions, and various other <a href="https://grapheneos.org/features">security features</a>. GrapheneOS also comes with full firmware updates and signed builds, so <a href="https://source.android.com/security/verifiedboot">verified boot</a> is fully supported.
|
||||
GrapheneOS has a lot of security hardening and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so [verified boot](https://source.android.com/security/verifiedboot) is fully supported.
|
||||
|
||||
Notably, GrapheneOS supports <a href="https://grapheneos.org/usage#sandboxed-play-services">Sandboxed Play Services</a>. Google Play Services can be run fully sandboxed like a regular user app and contained in a work profile or user <a href="/android/#android-security-privacy">profile</a> of your choice. This means that you can run apps dependant on Play Services, such as those that require push notifications using Google's <a href="https://firebase.google.com/docs/cloud-messaging/">Firebase Cloud Messaging</a> service. GrapheneOS allows you to take advantage of most <a href="https://en.wikipedia.org/wiki/Google_Play_Services">Google Play Services</a> whilst having full user control over their permissions and access.
|
||||
Notably, GrapheneOS supports [Sandboxed Play Services](https://grapheneos.org/usage#sandboxed-play-services). Google Play Services can be run fully sandboxed like a regular user app and contained in a work profile or user [profile](/android/#android-security-privacy) of your choice. This means that you can run apps dependant on Play Services, such as those that require push notifications using Google's [Firebase Cloud Messaging](https://firebase.google.com/docs/cloud-messaging/) service. GrapheneOS allows you to take advantage of most [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) whilst having full user control over their permissions and access.
|
||||
|
||||
Currently, only <a href="https://grapheneos.org/faq#device-support">Pixel phones</a> meet its hardware security requirement and are supported.
|
||||
Currently, only [Pixel phones](https://grapheneos.org/faq#device-support) meet its hardware security requirement and are supported.
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
GrapheneOS's "extended support" devices do not have full security patches (firmware updates) due to the original equipment manufacturer (OEM) discontinuing support. These devices cannot be considered completely secure.
|
||||
website: 'https://grapheneos.org/'
|
||||
privacy_policy: 'https://grapheneos.org/faq#privacy-policy'
|
||||
|
@@ -2,20 +2,20 @@ title: CalyxOS
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/calyxos.svg
|
||||
description: |
|
||||
<strong>CalyxOS</strong> is a decent alternative to GrapheneOS.
|
||||
**CalyxOS** is a decent alternative to GrapheneOS.
|
||||
|
||||
It has some privacy features on top of AOSP, such as the <a href="https://calyxos.org/docs/tech/datura-details"> Datura firewall</a>, <a href="https://signal.org">Signal</a> integration in the dialer app, and a built in panic button. CalyxOS also comes with firmware updates and signed builds, so <a href="https://source.android.com/security/verifiedboot">verified boot</a> is fully supported.
|
||||
It has some privacy features on top of AOSP, such as the [Datura firewall](https://calyxos.org/docs/tech/datura-details), [Signal](https://signal.org) integration in the dialer app, and a built in panic button. CalyxOS also comes with firmware updates and signed builds, so [verified boot](https://source.android.com/security/verifiedboot) is fully supported.
|
||||
|
||||
To accomodate users who need Google Play Services, CalyxOS optionally includes <a href="https://microg.org/">MicroG</a>. With MicroG, CalyxOS also bundles in the <a href="https://location.services.mozilla.com/">Mozilla</a> and <a href="https://github.com/n76/DejaVu">DejaVu</a> location services.
|
||||
To accomodate users who need Google Play Services, CalyxOS optionally includes [MicroG](https://microg.org/). With MicroG, CalyxOS also bundles in the [Mozilla](https://location.services.mozilla.com/) and [DejaVu](https://github.com/n76/DejaVu) location services.
|
||||
|
||||
Currently, CalyxOS <a href="https://calyxos.org/docs/guide/device-support/">supports</a> Google Pixel phones and the Xiaomi Mi A2. For legacy devices, CalyxOS offers "extended support" for much longer than GrapheneOS, making it a good choice once GrapheneOS has dropped support.
|
||||
Currently, CalyxOS [supports](https://calyxos.org/docs/guide/device-support/) Google Pixel phones and the Xiaomi Mi A2. For legacy devices, CalyxOS offers "extended support" for much longer than GrapheneOS, making it a good choice once GrapheneOS has dropped support.
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
CalyxOS's "extended support" does not have full security patches due to the original equipment manufacturer (OEM) discontinuing support, therefore they cannot be considered completely secure.
|
||||
|
||||
With the Xiaomi Mi A2, CalyxOS does not distribute the latest firmware. Newer versions of the firmware prevented the device from performing verified boot.
|
||||
|
||||
The Datura firewall can leak in some circumstances (see <a href="https://gitlab.com/CalyxOS/calyxos/-/issues/572">#572</a> and <a href="https://gitlab.com/CalyxOS/calyxos/-/issues/581">#581</a>).
|
||||
The Datura firewall can leak in some circumstances (see [#572](https://gitlab.com/CalyxOS/calyxos/-/issues/572) and [#581](https://gitlab.com/CalyxOS/calyxos/-/issues/581)).
|
||||
website: 'https://calyxos.org'
|
||||
privacy_policy: 'https://calyxinstitute.org/legal/privacy-policy'
|
||||
downloads:
|
||||
|
@@ -2,22 +2,22 @@ title: DivestOS
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/divestos.svg
|
||||
description: |
|
||||
<strong>DivestOS</strong> is a <a href="https://en.wikipedia.org/wiki/Fork_(software_development)#Forking_of_free_and_open-source_software">soft-fork</a> of <a href="https://lineageos.org/">LineageOS</a>.
|
||||
**DivestOS** is a [soft-fork](https://en.wikipedia.org/wiki/Fork_(software_development)#Forking_of_free_and_open-source_software) of [LineageOS](https://lineageos.org/).
|
||||
|
||||
DivestOS inherits many <a href="https://divestos.org/index.php?page=devices&base=LineageOS">supported devices</a> from LineageOS. It has signed builds, making it possible to have <a href="https://source.android.com/security/verifiedboot">verified boot</a> on some non-Pixel devices.
|
||||
DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices.
|
||||
|
||||
DivestOS has automated kernel vulnerability (<a href="https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures">CVE</a>) <a href="https://gitlab.com/divested-mobile/cve_checker">patching</a>, fewer proprietary blobs, a custom <a href="https://divested.dev/index.php?page=dnsbl">hosts</a> file, along with bundled <a href="https://www.f-droid.org">F-Droid</a> as the app store. It also includes <a href="https://github.com/microg/UnifiedNlp">UnifedNlp</a> for network location and some hardening with <a href="https://gitlab.com/divested-mobile/mulch">Mulch Webview</a>. DivestOS also includes kernel patches from GrapheneOS and enables security features in <a href="https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L698">defconfig</a>.
|
||||
DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, a custom [hosts](https://divested.dev/index.php?page=dnsbl) file, along with bundled [F-Droid](https://www.f-droid.org) as the app store. It also includes [UnifedNlp](https://github.com/microg/UnifiedNlp) for network location and some hardening with [Mulch Webview](https://gitlab.com/divested-mobile/mulch). DivestOS also includes kernel patches from GrapheneOS and enables security features in [defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L698).
|
||||
|
||||
DivestOS also inherits LineageOS's <a href="https://reddit.com/comments/c4a6f7">iptables</a> network access feature. You can deny network access to an individual application by pressing and holding on the app's icon (App info → Data and Network → Uncheck "Network Access").
|
||||
DivestOS also inherits LineageOS's [iptables](https://reddit.com/comments/c4a6f7) network access feature. You can deny network access to an individual application by pressing and holding on the app's icon (App info → Data and Network → Uncheck "Network Access").
|
||||
|
||||
DivestOS 16.0 and 17.1 has GrapheneOS's <a href="https://github.com/GrapheneOS/hardened_malloc">hardened memory allocator</a>. There are plans to port this to DivestOS 18.1.
|
||||
DivestOS 16.0 and 17.1 has GrapheneOS's [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc). There are plans to port this to DivestOS 18.1.
|
||||
|
||||
<h4>Notes</h4>
|
||||
DivestOS firmware update <a href="https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS">status</a> varies across the devices it supports. For Pixel phones, we still recommend using GrapheneOS or CalyxOS. For other supported devices, DivestOS is a good alternative.
|
||||
#### Notes
|
||||
DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) varies across the devices it supports. For Pixel phones, we still recommend using GrapheneOS or CalyxOS. For other supported devices, DivestOS is a good alternative.
|
||||
|
||||
Like CalyxOS's firewall, the network access toggle can also leak in <a href="https://gitlab.com/LineageOS/issues/android/-/issues/3228">some</a> situations.
|
||||
Like CalyxOS's firewall, the network access toggle can also leak in [some](https://gitlab.com/LineageOS/issues/android/-/issues/3228) situations.
|
||||
|
||||
Not all of the supported devices have <a href="https://source.android.com/security/verifiedboot">verified boot</a> and some perform it better than others.
|
||||
Not all of the supported devices have [verified boot](https://source.android.com/security/verifiedboot) and some perform it better than others.
|
||||
|
||||
website: 'https://divestos.org'
|
||||
website_tor: 'http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion'
|
||||
|
@@ -2,7 +2,7 @@ title: Nextcloud
|
||||
type: Recommendation
|
||||
logo: /assets/img/cloud/nextcloud.svg
|
||||
description: |
|
||||
<strong>Nextcloud</strong> is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. It also comes with experimental end-to-end encryption (E2EE).
|
||||
**Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. It also comes with experimental end-to-end encryption (E2EE).
|
||||
|
||||
We recommend checking if your Nextcloud provider supports E2EE, otherwise you have to trust the provider to not look at your files.
|
||||
|
||||
|
@@ -2,11 +2,11 @@ title: Proton Drive
|
||||
type: Recommendation
|
||||
logo: /assets/img/cloud/protondrive.svg
|
||||
description: |
|
||||
<strong>Proton Drive</strong> is an end-to-end encrypted (E2EE) general file storage service by the popular encrypted email provider <a href="https://protonmail.com">ProtonMail</a>.
|
||||
**Proton Drive** is an end-to-end encrypted (E2EE) general file storage service by the popular encrypted email provider [ProtonMail](https://protonmail.com).
|
||||
|
||||
Proton Drive is currently in beta and only is only available through a web client.
|
||||
|
||||
When using a web client, you are placing trust in the server to send you proper JavaScript code to derive the decryption key and authentication token locally in your browser. A compromised server can send you malicious JavaScript code to steal your master password and decrypt your data. If this does not fit your <a href="/threat-modeling/">threat model</a>, consider using an alternative.
|
||||
When using a web client, you are placing trust in the server to send you proper JavaScript code to derive the decryption key and authentication token locally in your browser. A compromised server can send you malicious JavaScript code to steal your master password and decrypt your data. If this does not fit your [threat model](/threat-modeling/), consider using an alternative.
|
||||
|
||||
website: 'https://protonmail.com'
|
||||
privacy_policy: 'https://protonmail.com/privacy-policy'
|
||||
|
@@ -3,7 +3,7 @@ type: Recommendation
|
||||
logo: /assets/img/cloud/tahoe-lafs.svg
|
||||
logo_dark: /assets/img/cloud/tahoe-lafs-dark.svg
|
||||
description: |
|
||||
<strong>Tahoe-LAFS</strong> is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security. The servers used as storage pools do not have access to your data.
|
||||
**Tahoe-LAFS** is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security. The servers used as storage pools do not have access to your data.
|
||||
|
||||
Due to the complexity of the system and the amount of nodes needed to set it up, Tahoe-LAFS is only recommended for seasoned system administrators.
|
||||
website: 'https://www.tahoe-lafs.org/'
|
||||
|
@@ -2,16 +2,16 @@ title: DuckDuckGo
|
||||
type: Recommendation
|
||||
logo: /assets/img/search-engines/duckduckgo.svg
|
||||
description: |
|
||||
<strong>DuckDuckGo</strong> is a popular search engine and is the default for the Tor Browser.
|
||||
**DuckDuckGo** is a popular search engine and is the default for the Tor Browser.
|
||||
|
||||
DuckDuckGo has a <a href="https://duckduckgo.com/lite">lite</a> and <a href="https://duckduckgo.com/html">html</a> only version, both of which <a href="https://help.duckduckgo.com/features/non-javascript">do not require JavaScript</a> and can be used with their <a href="https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion">Tor onion address</a> (append <a href="https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite">/lite</a> or <a href="https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html">/html</a> for the respective version).
|
||||
DuckDuckGo has a [lite](https://duckduckgo.com/lite) and [html](https://duckduckgo.com/html) only version, both of which [do not require JavaScript](https://help.duckduckgo.com/features/non-javascript) and can be used with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) (append [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version).
|
||||
|
||||
DuckDuckGo uses its own crawler and various <a href="https://help.duckduckgo.com/results/sources">other sources</a> to provide its search data.
|
||||
DuckDuckGo uses its own crawler and various [other sources](https://help.duckduckgo.com/results/sources) to provide its search data.
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
The company is based in the <span class="flag-icon flag-icon-us"></span> USA.
|
||||
|
||||
Their <a href="https://duckduckgo.com/privacy">Privacy Policy</a> states they do log your search query, but not your IP or any other identifying information.
|
||||
Their [Privacy Policy](https://duckduckgo.com/privacy) states they do log your search query, but not your IP or any other identifying information.
|
||||
|
||||
website: 'https://duckduckgo.com'
|
||||
website_tor: 'https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion'
|
||||
|
@@ -2,16 +2,16 @@ title: Startpage
|
||||
type: Recommendation
|
||||
logo: /assets/img/search-engines/startpage.svg
|
||||
description: |
|
||||
<strong>Startpage</strong> is a search engine that provides Google search results. It is a very convenient way to get Google search results without experiencing dark patterns such as difficult captchas or being refused access because you used a <a href="/providers/vpn">VPN</a> or <a href="https://www.torproject.org/download/">Tor</a>.
|
||||
**Startpage** is a search engine that provides Google search results. It is a very convenient way to get Google search results without experiencing dark patterns such as difficult captchas or being refused access because you used a [VPN](/providers/vpn) or [Tor](https://www.torproject.org/download/).
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
Startpage's majority shareholder is System1 who is an adtech company. We don't think that is an issue as they have their own Privacy Policy.
|
||||
|
||||
The Privacy Guides team reached out to Startpage <a href="https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/">back in 2020</a> for clarification and was satisfied by the answers we received.
|
||||
The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) for clarification and was satisfied by the answers we received.
|
||||
|
||||
Startpage is based in the <span class="flag-icon flag-icon-nl"></span> Netherlands.
|
||||
|
||||
According to their <a href="https://www.startpage.com/en/privacy-policy/">Privacy Policy</a>, they only log details such as\: operating system, type of browser and language. They do not log your IP address, search queries or other identifying information.
|
||||
According to their [Privacy Policy](https://www.startpage.com/en/privacy-policy/), they only log details such as: operating system, type of browser and language. They do not log your IP address, search queries or other identifying information.
|
||||
|
||||
Startpage proxies Google Search so Google does have access to your search queries.
|
||||
|
||||
|
@@ -2,12 +2,12 @@ title: Mojeek
|
||||
type: Recommendation
|
||||
logo: /assets/img/search-engines/mojeek.svg
|
||||
description: |
|
||||
<strong>Mojeek</strong> is another privacy friendly search engine. They use their own crawler to provide search data.
|
||||
**Mojeek** is another privacy friendly search engine. They use their own crawler to provide search data.
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
The company is based in the <span class="flag-icon flag-icon-gb"></span> UK.
|
||||
|
||||
According to their <a href="https://www.mojeek.com/about/privacy/">Privacy Policy</a>, they log the originating country, time, page requested, and referral data of each query. IP addresses are not logged.
|
||||
According to their [Privacy Policy](https://www.mojeek.com/about/privacy/), they log the originating country, time, page requested, and referral data of each query. IP addresses are not logged.
|
||||
|
||||
website: 'https://www.mojeek.com'
|
||||
privacy_policy: 'https://www.mojeek.com/about/privacy'
|
||||
|
@@ -2,9 +2,9 @@ title: Searx
|
||||
type: Recommendation
|
||||
logo: /assets/img/search-engines/searx.svg
|
||||
description: |
|
||||
<strong>Searx</strong> is an <a href="https://github.com/asciimoo/searx">open-source</a>, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a <a href="https://searx.space/">list of public instances</a>.
|
||||
**Searx** is an [open-source](https://github.com/asciimoo/searx), self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a [list of public instances](https://searx.space/).
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
Searx is a proxy between the user and the search engines it aggregates from. Your search queries will still be sent to the search engines that Searx gets its results from.
|
||||
|
||||
When self-hosting, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting Searx, as other people looking up illegal content on your instance could draw unwanted attention from authorities.
|
||||
|
@@ -2,31 +2,32 @@ title: Firefox Desktop
|
||||
type: Recommendation
|
||||
logo: /assets/img/browsers/firefox.svg
|
||||
description: |
|
||||
<strong>Firefox</strong> has some really strong privacy settings such as <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop">Enhanced Tracking Protection</a> which can help block various <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks">types of tracking</a>.
|
||||
**Firefox** has some really strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop) which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks).
|
||||
|
||||
These options can be found in the <em>Privacy & Security</em> settings page ( ≡ → Settings → Privacy & Security).
|
||||
<h5><strong>Enhanced Tracking Protection (ETP)</strong>.</h5>
|
||||
These options can be found in the *Privacy & Security* settings page ( ≡ → Settings → Privacy & Security).
|
||||
|
||||
##### **Enhanced Tracking Protection (ETP)**
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: <strong>Strict</strong></li>
|
||||
</ul>
|
||||
|
||||
<h5><strong>HTTPS-Only Mode</strong></h5>
|
||||
##### **HTTPS-Only Mode**
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: <strong>Enable HTTPS-Only Mode in all windows</strong>.</li>
|
||||
</ul>
|
||||
|
||||
<h5><strong>Sanitizing on close</strong></h5>
|
||||
##### **Sanitizing on close**
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: <strong>Delete cookies and site data when Firefox is closed</strong></li>
|
||||
</ul>
|
||||
You can still stay logged into websites by allowing exceptions.
|
||||
|
||||
<h4>Extensions</h4>
|
||||
We normally do not recommend installing any extensions, as they have privileged access within your browser. We make an exception for <a href="/browsers/#additional-resources">uBlock Origin</a>,
|
||||
a popular content blocker and 🏆️ <a href="https://support.mozilla.org/kb/add-on-badges#w_recommended-extensions">Recommended Extension</a> by Mozilla.
|
||||
#### Extensions
|
||||
We normally do not recommend installing any extensions, as they have privileged access within your browser. We make an exception for [uBlock Origin](/browsers/#additional-resources),
|
||||
a popular content blocker and 🏆️ [Recommended Extension](https://support.mozilla.org/kb/add-on-badges#w_recommended-extensions) by Mozilla.
|
||||
|
||||
<h4>Arkenfox (advanced)</h4>
|
||||
The <a href="https://github.com/arkenfox/user.js">Arkenfox project</a> provides a set of carefully considered options for Firefox. These options are quite strict but a few are subjective and can sometimes cause a website to not work properly. You can easily change these settings to suit your needs. We <strong>strongly recommend</strong> reading through the <a href="https://github.com/arkenfox/user.js/wiki">basics</a> section. Arkenfox also enables <a href="https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users">container</a> support.
|
||||
#### Arkenfox (advanced)
|
||||
The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. These options are quite strict but a few are subjective and can sometimes cause a website to not work properly. You can easily change these settings to suit your needs. We **strongly recommend** reading through the [basics](https://github.com/arkenfox/user.js/wiki) section. Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support.
|
||||
|
||||
website: 'https://firefox.com'
|
||||
privacy_policy: 'https://www.mozilla.org/privacy/firefox'
|
||||
|
@@ -2,16 +2,16 @@ title: Bromite
|
||||
type: Recommendation
|
||||
logo: /assets/img/browsers/bromite.svg
|
||||
description: |
|
||||
<strong>Bromite</strong> is a Chromium-based browser with privacy and security enhancements, built-in ad blocking and some fingerprinting randomization.
|
||||
**Bromite** is a Chromium-based browser with privacy and security enhancements, built-in ad blocking and some fingerprinting randomization.
|
||||
|
||||
These options can be found in <em>Privacy and Security</em> ( ⁝ → ⚙️ Settings → Privacy and Security)
|
||||
These options can be found in *Privacy and Security* ( ⁝ → ⚙️ Settings → Privacy and Security)
|
||||
|
||||
<h5><strong>HTTPS-Only Mode</strong></h5>
|
||||
##### **HTTPS-Only Mode**
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: <strong>Always use secure connections</strong>.</li>
|
||||
</ul>
|
||||
|
||||
<h5><strong>Always on Incognito mode</strong></h5>
|
||||
##### **Always on Incognito mode**
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: <strong>Open links in incognito tabs always</strong>.</li>
|
||||
<li>Select: <strong>Close all open tabs on exit</strong>.</li>
|
||||
|
@@ -2,14 +2,14 @@ title: Firefox iOS
|
||||
type: Recommendation
|
||||
logo: /assets/img/browsers/firefox-ios.svg
|
||||
description: |
|
||||
<strong>Firefox</strong> iOS includes <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop">Tracking Protection</a> which lets you select the blocklists Cookies, Tracking Content, Cryptominers, Fingerprinters and Redirect trackers.
|
||||
**Firefox** iOS includes [Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-ios) which lets you select the blocklists Cookies, Tracking Content, Cryptominers, Fingerprinters and Redirect trackers.
|
||||
|
||||
<h5><strong>Tracking Protection</strong></h5>
|
||||
##### **Tracking Protection**
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: <strong>Strict</strong> ( ≡ → ⚙️ Settings → Tracking Protection).</li>
|
||||
</ul>
|
||||
|
||||
<h5><strong>Sanitizing on close</strong></h5>
|
||||
##### **Sanitizing on close**
|
||||
Firefox iOS does not have have an option to clear cache on quit so you must do it manually. ( ≡ → ⚙️ Settings → Data Management).
|
||||
|
||||
website: 'https://firefox.com'
|
@@ -2,14 +2,14 @@ title: Firefox Focus iOS
|
||||
type: Recommendation
|
||||
logo: /assets/img/browsers/firefox_focus.svg
|
||||
description: |
|
||||
<strong>Firefox</strong> Focus iOS includes <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-ios">Tracking Protection</a> which lets you select the blocklists ad trackers, analytic trackers, social trackers and other content tracking.
|
||||
**Firefox** Focus iOS includes [Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-ios) which lets you select the blocklists ad trackers, analytic trackers, social trackers and other content tracking.
|
||||
|
||||
Focus also destroys browsing history on quit automatically which is a good way of automatically clearing cookies and website data regularly which is helpful to prevent tracking.
|
||||
|
||||
<h5><strong>Sanitizing on close</strong></h5>
|
||||
##### **Sanitizing on close**
|
||||
Focus sanitizies all data on close by default. Pressing on the <img alt="iOS Garbage Bin icon" width="16" height="16" src="/assets/img/browsers/ios-trash.svg"/> will immediately destroy all cookies and website data for the entire session.
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
Focus only lets you open one tab at a time.
|
||||
|
||||
website: 'https://firefox.com'
|
@@ -2,12 +2,12 @@ title: uBlock Origin
|
||||
type: Recommendation
|
||||
logo: /assets/img/browsers/ublock_origin.svg
|
||||
description: |
|
||||
<strong>uBlock Origin</strong> is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts.
|
||||
**uBlock Origin** is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts.
|
||||
|
||||
We suggest enabling all of the <a href="https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists">filter lists</a> under the "Ads", "Privacy" and "Malware domains". The "Annoyances" and "Multipurpose" lists can also be enabled, but they may break some social media functions. The <em>AdGuard URL Tracking Protection</em> filter list makes extensions like CleanURLs and NeatURLs redundant.
|
||||
We suggest enabling all of the [filter lists](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) under the "Ads", "Privacy" and "Malware domains". The "Annoyances" and "Multipurpose" lists can also be enabled, but they may break some social media functions. The *AdGuard URL Tracking Protection* filter list makes extensions like CleanURLs and NeatURLs redundant.
|
||||
|
||||
We also suggest adding the <a href="https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt">Actually Legitimate URL Shortener Tool</a> list and any of the regional lists that might apply to your browsing habits. Additional filter lists do slow things down, so only apply the languages that you use.
|
||||
We also suggest adding the [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) list and any of the regional lists that might apply to your browsing habits. Additional filter lists do slow things down, so only apply the languages that you use.
|
||||
|
||||
uBlock Origin also has different <a href="https://github.com/gorhill/uBlock/wiki/Blocking-mode">blocking modes</a>. The easy mode <a href="https://www.ranum.com/security/computer_security/editorials/dumb/">might not</a> necessarily keep you safe from every tracker out there, whereas the more advanced modes let you control exactly what needs to run.
|
||||
uBlock Origin also has different [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). The easy mode [might not](https://www.ranum.com/security/computer_security/editorials/dumb/) necessarily keep you safe from every tracker out there, whereas the more advanced modes let you control exactly what needs to run.
|
||||
website: 'https://addons.mozilla.org/firefox/addon/ublock-origin/'
|
||||
privacy_policy: 'https://github.com/gorhill/uBlock/wiki/Privacy-policy'
|
||||
|
@@ -2,7 +2,7 @@ title: Terms of Service; Didn't Read
|
||||
type: Recommendation
|
||||
logo: /assets/img/browsers/terms_of_service_didnt_read.svg
|
||||
description: |
|
||||
<strong>Terms of Service; Didn't Read</strong> grades websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.
|
||||
**Terms of Service; Didn't Read** grades websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.
|
||||
|
||||
We do not recommend installing ToS;DR as a browser extension. The same information is provided on their website.
|
||||
website: 'https://tosdr.org/'
|
||||
|
@@ -3,10 +3,10 @@ type: Recommendation
|
||||
info: Provides Anonymity
|
||||
logo: /assets/img/browsers/tor.svg
|
||||
description: |
|
||||
<strong>Tor Browser</strong> is the choice if you need anonymity. This browser provides you with access to the Tor Bridges and Tor Network, along with extensions that can be automatically configured to fit its three security levels - <em>Standard</em>, <em>Safer</em> and <em>Safest</em>. We recommend that you do not change any of Tor Browser's default configurations outside of the standard security levels.
|
||||
**Tor Browser** is the choice if you need anonymity. This browser provides you with access to the Tor Bridges and Tor Network, along with extensions that can be automatically configured to fit its three security levels - *Standard*, *Safer* and *Safest*. We recommend that you do not change any of Tor Browser's default configurations outside of the standard security levels.
|
||||
|
||||
<h4>Extensions</h4>
|
||||
You should <strong>never</strong> install any additional extensions on Tor Browser, including the ones we suggest for Firefox. Browser extensions make you stand out from other Tor users and your browser easier to <a href="https://support.torproject.org/glossary/browser-fingerprinting">fingerprint</a>.
|
||||
#### Extensions
|
||||
You should **never** install any additional extensions on Tor Browser, including the ones we suggest for Firefox. Browser extensions make you stand out from other Tor users and your browser easier to [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting).
|
||||
|
||||
website: 'https://www.torproject.org/'
|
||||
website_tor: 'http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/'
|
||||
|
@@ -4,18 +4,19 @@ logo: /assets/img/messengers/signal.svg
|
||||
labels: 'color==info::icon==fas fa-fw fa-wifi::text==Centralized::tooltip==All communications pass through a single host. |
|
||||
color==info::icon==fas fa-fw fa-phone::text==VoIP::tooltip==Voice or video calls are supported.'
|
||||
description: |
|
||||
<strong>Signal</strong> is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling.
|
||||
**Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling.
|
||||
|
||||
All communications are E2EE. Contact lists are encrypted using your login PIN and the server does not have access to it. Personal profiles are also encrypted and only shared with contacts who add you.
|
||||
|
||||
Signal has minimal metadata when <a href="https://signal.org/blog/sealed-sender/">Sealed Sender</a> is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server.
|
||||
Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server.
|
||||
|
||||
<h4>Notes</h4>
|
||||
<p>Signal requires your phone number as a personal identifier.</p>
|
||||
<p><a href="https://signal.org/blog/sealed-sender/">Sealed Sender</a> is only enabled for users on your contact list but can be enabled for all recipients with the increased risk of receiving spam.</p>
|
||||
#### Notes
|
||||
Signal requires your phone number as a personal identifier.
|
||||
|
||||
<h4>Technical information</h4>
|
||||
The protocol was independently <a href="https://eprint.iacr.org/2016/1013.pdf">audited</a> in 2016. The specification for the Signal protocol can be founded in their <a href="https://signal.org/docs/">documentation</a>.
|
||||
[Sealed Sender](https://signal.org/blog/sealed-sender/) is only enabled for users on your contact list but can be enabled for all recipients with the increased risk of receiving spam.
|
||||
|
||||
#### Technical information
|
||||
The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be founded in their [documentation](https://signal.org/docs/).
|
||||
website: 'https://signal.org'
|
||||
privacy_policy: 'https://signal.org/legal'
|
||||
downloads:
|
||||
|
@@ -5,19 +5,19 @@ labels: 'color==info::icon==fas fa-fw fa-wifi::text==Federated::tooltip==Your co
|
||||
color==info::icon==fas fa-fw fa-wifi::text==P2P::tooltip==One-on-one voice and video calls are peer-to-peer (option can be disabled). |
|
||||
color==info::icon==fas fa-fw fa-phone::text==VoIP::tooltip==Voice or video calls are supported.'
|
||||
description: |
|
||||
<strong>Element</strong> is the reference client for the <a href="https://matrix.org/docs/guides/introduction">Matrix</a> protocol, an <a href="https://matrix.org/docs/spec">open standard</a> for secure decentralized real-time communication.
|
||||
**Element** is the reference client for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication.
|
||||
|
||||
Messages and files shared in private rooms (those which require an invite) are by default E2EE as are 1 to 1 voice and video calls.
|
||||
|
||||
<h4>Notes</h4>
|
||||
#### Notes
|
||||
Profile pictures, reactions, and nicknames are not encrypted.
|
||||
|
||||
Group voice and video calls are <a href="https://github.com/vector-im/element-web/issues/12878">not</a> E2EE, and use Jitsi, but this is expected to change with <a href="https://github.com/matrix-org/matrix-doc/pull/3401">Native Group VoIP Signalling</a>. Group calls have <a href="https://github.com/vector-im/element-web/issues/13074">no authentication</a> currently, meaning that non room participants can also join the calls. We recommend that you do not use this feature for private meetings.
|
||||
Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE, and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non room participants can also join the calls. We recommend that you do not use this feature for private meetings.
|
||||
|
||||
When using <a href="https://github.com/vector-im/element-web">element-web</a>, you must trust the server hosting the Element client. If your <a href="/threat-modeling">threat model</a> requires stronger protection then use a desktop or mobile client instead.
|
||||
When using [element-web](https://github.com/vector-im/element-web), you must trust the server hosting the Element client. If your [threat model](/threat-modeling) requires stronger protection then use a desktop or mobile client instead.
|
||||
|
||||
<h4>Technical information</h4>
|
||||
The protocol was independently <a href="https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last">audited</a> in 2016. The specification for the Matrix protocol can be found in their <a href="https://spec.matrix.org/latest/">documentation</a>. The <a href="https://matrix.org/docs/projects/other/olm">Olm</a> cryptographic ratchet used by Matrix is an implementation of Signal's <a href="https://signal.org/docs/specifications/doubleratchet/">Double Ratchet algorithm</a>.
|
||||
#### Technical information
|
||||
The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal's [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/).
|
||||
|
||||
website: 'https://element.io'
|
||||
privacy_policy: 'https://element.io/privacy'
|
||||
|
@@ -4,17 +4,17 @@ logo: /assets/img/messengers/briar.svg
|
||||
labels: 'color==info::icon==fas fa-fw fa-wifi::text==P2P::tooltip==Senders and recipients connect directly with no middlemen (can be disabled). |
|
||||
color==info::icon==fas fa-fw fa-wifi::text==Anonymous Routing::tooltip==Senders and recipients are hidden in the network, no one can know they communicate together (can be disabled).'
|
||||
description: |
|
||||
<strong>Briar</strong> is an encrypted instant messenger that <a href="https://briarproject.org/how-it-works/">connects</a> to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar's local mesh mode can be useful when internet availability is a problem.
|
||||
**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar's local mesh mode can be useful when internet availability is a problem.
|
||||
|
||||
<h4>Notes</h4>
|
||||
To <a href="https://briarproject.org/manual/">add a contact</a> on Briar, you must both add each other first. You can either exchange <code>briar://</code> links or scan a contact's QR code if they are nearby.
|
||||
#### Notes
|
||||
To [add a contact](https://briarproject.org/manual/) on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact's QR code if they are nearby.
|
||||
|
||||
<h4>Technical information</h4>
|
||||
The client software was independently <a href="https://briarproject.org/news/2017-beta-released-security-audit/">audited</a> and the anonymous routing protocol uses the Tor network which has also been audited.
|
||||
#### Technical information
|
||||
The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/) and the anonymous routing protocol uses the Tor network which has also been audited.
|
||||
|
||||
Briar has a fully <a href="https://code.briarproject.org/briar/briar-spec">published specification</a>.
|
||||
Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec).
|
||||
|
||||
Briar supports perfect forward secrecy by using the Bramble <a href="https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BHP.md">Handshake</a> and <a href="https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BTP.md">Transport</a> protocol.
|
||||
Briar supports perfect forward secrecy by using the Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BHP.md) and [Transport](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BTP.md) protocol.
|
||||
website: 'https://briarproject.org'
|
||||
privacy_policy: 'https://briarproject.org/privacy-policy'
|
||||
downloads:
|
||||
|
@@ -3,17 +3,17 @@ type: Recommendation
|
||||
logo: /assets/img/messengers/session.svg
|
||||
labels: 'color==info::icon==fas fa-fw fa-wifi::text==Anonymous Routing::tooltip==Senders and recipients are hidden in the network, no one can know they communicate together.'
|
||||
description: |
|
||||
<strong>Session</strong> is an encrypted instant messenger that uses three random <a href="https://getsession.org/blog/onion-requests-session-new-message-routing-solution"> service nodes</a> to route messages anonymously on the <a href="https://oxen.io">Oxen Network</a>.
|
||||
**Session** is an encrypted instant messenger that uses three random [service nodes](https://getsession.org/blog/onion-requests-session-new-message-routing-solution) to route messages anonymously on the [Oxen Network](https://oxen.io).
|
||||
|
||||
Session allows for E2EE in one-to-one or closed rooms that allow up to 100 members.
|
||||
|
||||
Open rooms have no restriction on the number of members, but anyone can join.
|
||||
|
||||
<h4>Notes</h4>
|
||||
Session does <a href="https://getsession.org/blog/session-protocol-technical-information">not</a> support forward secrecy. The key pair for each conversation is not rotated.
|
||||
#### Notes
|
||||
Session does [not](https://getsession.org/blog/session-protocol-technical-information) support forward secrecy. The key pair for each conversation is not rotated.
|
||||
|
||||
<h4>Technical information</h4>
|
||||
Session was independently <a href="https://getsession.org/session-code-audit/">audited</a> in 2020. The protocol is described in a <a href="https://arxiv.org/abs/2002.04609">whitepaper</a>.
|
||||
#### Technical information
|
||||
Session was independently [audited](https://getsession.org/session-code-audit/) in 2020. The protocol is described in a [whitepaper](https://arxiv.org/abs/2002.04609).
|
||||
|
||||
website: 'https://getsession.org/'
|
||||
privacy_policy: 'https://getsession.org/privacy-policy'
|
||||
|
@@ -2,12 +2,12 @@ title: FreeTube
|
||||
type: Recommendation
|
||||
logo: /assets/img/video-streaming/freetube.svg
|
||||
description: |
|
||||
<strong>FreeTube</strong> is a free and open source desktop application for <a href="https://youtube.com">YouTube</a>. When using FreeTube, your subscription list and playlists are saved locally on your device.
|
||||
**FreeTube** is a free and open source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device.
|
||||
|
||||
FreeTube also features <a href="https://sponsor.ajay.app">SponsorBlock</a> to help you skip sponsored advertisements. All YouTube advertisements are also blocked by default.
|
||||
FreeTube also features [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored advertisements. All YouTube advertisements are also blocked by default.
|
||||
|
||||
<h4>Notes</h4>
|
||||
When using Freetube, your IP address is still known to YouTube, <a href="https://instances.invidious.io">Invidious</a> and the SponsorBlock instances that you use. Consider using a <a href='/providers/vpn'>VPN</a> or <a href="https://www.torproject.org">Tor</a> if your <a href="/threat-modeling">threat model</a> requires hiding your IP address.
|
||||
#### Notes
|
||||
When using Freetube, your IP address is still known to YouTube, [Invidious](https://instances.invidious.io) and the SponsorBlock instances that you use. Consider using a [VPN](/providers/vpn) or [Tor](https://www.torproject.org) if your [threat model](/threat-modeling) requires hiding your IP address.
|
||||
|
||||
website: 'https://freetubeapp.io'
|
||||
privacy_policy: 'https://freetubeapp.io/privacy.php'
|
||||
|
@@ -2,18 +2,18 @@ title: LBRY
|
||||
type: Recommendation
|
||||
logo: /assets/img/video-streaming/lbry.svg
|
||||
description: |
|
||||
<strong>The LBRY network</strong> is a decentralized video sharing network. It uses a <a href="https://wikipedia.org/wiki/BitTorrent">BitTorrent</a>-like network to store the video content, and a <a href="https://wikipedia.org/wiki/Blockchain">blockchain</a> to store the indexes for those videos. The main benefit of this design is censorship resistance.
|
||||
**The LBRY network** is a decentralized video sharing network. It uses a [BitTorrent](https://wikipedia.org/wiki/BitTorrent)-like network to store the video content, and a [blockchain](https://wikipedia.org/wiki/Blockchain) to store the indexes for those videos. The main benefit of this design is censorship resistance.
|
||||
|
||||
<strong>The LBRY desktop client</strong> helps you stream videos from the LBRY network, and stores your subscription list in your own LBRY wallet.
|
||||
**The LBRY desktop client** helps you stream videos from the LBRY network, and stores your subscription list in your own LBRY wallet.
|
||||
|
||||
<h4>Notes</h4>
|
||||
We recommend <strong>against</strong> synchronizing your wallet with LBRY Inc., as synchronizing encrypted wallets is not supported yet. If you synchronize your wallet with LBRY Inc., you have to trust them to not look at your subscription list, <a href="https://lbry.com/faq/earn-credits">LBC</a> funds, or take control of your channel.
|
||||
#### Notes
|
||||
We recommend **against** synchronizing your wallet with LBRY Inc., as synchronizing encrypted wallets is not supported yet. If you synchronize your wallet with LBRY Inc., you have to trust them to not look at your subscription list, [LBC](https://lbry.com/faq/earn-credits) funds, or take control of your channel.
|
||||
|
||||
Only the <strong>LBRY desktop client</strong> is recommended. The <a href="https://odysee.com">Odysee</a> website and the LBRY clients in F-Droid, Play Store and the AppStore have mandatory synchronization and telemetry.
|
||||
Only the **LBRY desktop client** is recommended. The [Odysee](https://odysee.com) website and the LBRY clients in F-Droid, Play Store and the AppStore have mandatory synchronization and telemetry.
|
||||
|
||||
While watching and hosting videos, your IP address is visible to the LBRY network. Consider using a <a href='/providers/vpn'>VPN</a> or <a href="https://www.torproject.org">Tor</a> if your <a href="/threat-modeling">threat model</a> requires hiding your IP address.
|
||||
While watching and hosting videos, your IP address is visible to the LBRY network. Consider using a [VPN](/providers/vpn) or [Tor](https://www.torproject.org) if your [threat model](/threat-modeling) requires hiding your IP address.
|
||||
|
||||
You can also disable <em>Save hosting data to help the LBRY network</em> option (⚙️ Settings → Advanced Settings) to avoid exposing your IP address and watched videos when using LBRY for a prolonged period of time.
|
||||
You can also disable *Save hosting data to help the LBRY network* option (⚙️ Settings → Advanced Settings) to avoid exposing your IP address and watched videos when using LBRY for a prolonged period of time.
|
||||
|
||||
website: 'https://lbry.com/'
|
||||
privacy_policy: 'https://lbry.com/privacypolicy'
|
||||
|
@@ -2,11 +2,11 @@ title: NewPipe
|
||||
type: Recommendation
|
||||
logo: /assets/img/video-streaming/newpipe.svg
|
||||
description: |
|
||||
<strong>NewPipe</strong> is a free and open source Android application for <a href="https://youtube.com">YouTube</a>, <a href="https://soundcloud.com">SoundCloud</a>, <a href="https://media.ccc.de">media.ccc.de</a>, <a href="https://framatube.org">FramaTube</a> and <a href="https://bandcamp.com">Bandcamp</a>.
|
||||
**NewPipe** is a free and open source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [FramaTube](https://framatube.org) and [Bandcamp](https://bandcamp.com).
|
||||
Your subscription list and playlists are saved locally on your Android device.
|
||||
|
||||
<h4>Notes</h4>
|
||||
NewPipe is available on the main <a href="https://www.f-droid.org">F-Droid</a>'s repository. We recommend that you use the NewPipe's own <a href="https://newpipe.net/FAQ/tutorials/install-add-fdroid-repo">F-Droid repository</a> instead to get faster updates. Sometimes YouTube changes their website and the official repository has new updates sooner.
|
||||
#### Notes
|
||||
NewPipe is available on the main [F-Droid](https://www.f-droid.org)'s repository. We recommend that you use the NewPipe's own [F-Droid repository](https://newpipe.net/FAQ/tutorials/install-add-fdroid-repo) instead to get faster updates. Sometimes YouTube changes their website and the official repository has new updates sooner.
|
||||
website: 'https://newpipe.net'
|
||||
privacy_policy: 'https://newpipe.net/legal/privacy'
|
||||
downloads:
|
||||
|
@@ -2,11 +2,11 @@ title: NewPipe x SponsorBlock
|
||||
type: Recommendation
|
||||
logo: /assets/img/video-streaming/newpipe.svg
|
||||
description: |
|
||||
<strong>NewPipe x SponsorBlock</strong> is a fork of <a href="https://newpipe.net">NewPipe</a> with <a href="https://sponsor.ajay.app">SponsorBlock</a> integrated to help you skip sponsored advertisements.
|
||||
**NewPipe x SponsorBlock** is a fork of [NewPipe](https://newpipe.net) with [SponsorBlock](https://sponsor.ajay.app) integrated to help you skip sponsored advertisements.
|
||||
It also has some experimental settings such as the ability to use the built-in player for local playback, an option to force fullscreen on landscape mode, and an option to disable error reporting prompts.
|
||||
|
||||
<h4>Notes</h4>
|
||||
This fork is not endorsed by or affiliated with the upstream project. The NewPipe team has <a href="https://github.com/TeamNewPipe/NewPipe/pull/3205">rejected</a> integration with SponsorBlock and thus this fork is created to provide this functionality.
|
||||
#### Notes
|
||||
This fork is not endorsed by or affiliated with the upstream project. The NewPipe team has [rejected](https://github.com/TeamNewPipe/NewPipe/pull/3205) integration with SponsorBlock and thus this fork is created to provide this functionality.
|
||||
downloads:
|
||||
- icon: fab fa-android
|
||||
url: 'https://apt.izzysoft.de/fdroid/index/apk/org.polymorphicshade.newpipe'
|
||||
|
@@ -3,10 +3,10 @@ type: Recommendation
|
||||
logo: /assets/img/video-streaming/invidious.svg
|
||||
logo_dark: /assets/img/video-streaming/invidious-dark.svg
|
||||
description: |
|
||||
<strong>Invidious</strong> is a free and open source front end for YouTube that is also self-hostable. There are list of <a href="https://instances.invidious.io">public instances</a>. Some instances have <a href="https://www.torproject.org">Tor</a> onion services support.
|
||||
**Invidious** is a free and open source front end for YouTube that is also self-hostable. There are list of [public instances](https://instances.invidious.io). Some instances have [Tor](https://www.torproject.org) onion services support.
|
||||
|
||||
<h4>Notes</h4>
|
||||
Invidious does not proxy the video stream through its server by default. Videos watched through Invidious will still make direct connections to Google's servers (googlevideo.com), however, some instances support video proxying. This can be enabled by adding <code>&local=true</code> to the URL.
|
||||
#### Notes
|
||||
Invidious does not proxy the video stream through its server by default. Videos watched through Invidious will still make direct connections to Google's servers (googlevideo.com), however, some instances support video proxying. This can be enabled by adding `&local=true` to the URL.
|
||||
|
||||
When self-hosting, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting Invidious, as other peoples' usage will be linked to your hosting.
|
||||
|
||||
|
Reference in New Issue
Block a user