diff --git a/content/activism/legal/_index.md b/content/activism/legal/_index.md new file mode 100644 index 000000000..2eeb895a9 --- /dev/null +++ b/content/activism/legal/_index.md @@ -0,0 +1,6 @@ +--- +title: Legal Resources +build: + list: local + render: link +--- diff --git a/content/activism/legal/dpa-directory/index.md b/content/activism/legal/dpa-directory/index.md index 3e10d6900..9d7c4a4c7 100644 --- a/content/activism/legal/dpa-directory/index.md +++ b/content/activism/legal/dpa-directory/index.md @@ -1,10 +1,18 @@ --- title: "Data Protection Authorities" description: The DPA Directory is a tool to help you find the principal consumer privacy law in your region, the authority mandated to enforce it, and how to report violations. -sidebar: - hide: true +# sidebar: +# hide: true +aliases: + - /activism/legal --- + + The **Data Protection Authority** (DPA) **Directory** is a tool to help you find the main consumer privacy law in your region, and the authority mandated to enforce the law. Additionally, this table provides information about each law, authority, contact information for questions, and a link to place a complaint for violation of the law with each authority. diff --git a/content/tools/advanced/_index.md b/content/tools/advanced/_index.md index 7060424f9..f6dfc6cfc 100644 --- a/content/tools/advanced/_index.md +++ b/content/tools/advanced/_index.md @@ -2,25 +2,7 @@ title: Advanced description: Specialized tools for anonymity networks, censorship circumvention, and device integrity checks. weight: 70 +build: + list: local + render: link --- - -## Alternative Networks - -
-{{< cards >}} - {{< card link="alternative-networks/index.md#tor" title="Tor" image="alternative-networks/tor.svg" subtitle="The Tor network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with “.onion hidden services” without compromising their privacy." >}} - {{< card link="alternative-networks/index.md#orbot" title="Orbot" image="alternative-networks/orbot.svg" subtitle="Orbot is a mobile application which routes traffic from any app on your device through the Tor network." >}} - {{< card link="alternative-networks/index.md#snowflake" title="Snowflake" image="alternative-networks/snowflake.svg" subtitle="Snowflake allows you to donate bandwidth to the Tor Project by operating a “Snowflake proxy” within your browser." >}} - {{< card link="alternative-networks/index.md#i2p-the-invisible-internet-project" title="I2P" image="alternative-networks/i2p.svg" subtitle="I2P is a network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous." >}} -{{< /cards >}} -
- -## Device Integrity Verification - -
-{{< cards >}} - {{< card link="device-integrity/index.md#mobile-verification-toolkit" title="MVT" image="device-integrity/mvt.webp" subtitle="Mobile Verification Toolkit (MVT) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the Pegasus Project." >}} - {{< card link="device-integrity/index.md#imazing-ios" title="iMazing" image="device-integrity/imazing.png" subtitle="iMazing provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for MVT. This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators." >}} - {{< card link="device-integrity/index.md#auditor-android" title="Auditor" image="device-integrity/auditor.svg" subtitle="Auditor is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for supported devices." >}} -{{< /cards >}} -
diff --git a/content/tools/advanced/alternative-networks/index.md b/content/tools/advanced/alternative-networks/index.md index 7bde795fe..7acd6c320 100644 --- a/content/tools/advanced/alternative-networks/index.md +++ b/content/tools/advanced/alternative-networks/index.md @@ -1,6 +1,8 @@ --- title: "Alternative Networks" description: These tools allow you to access networks other than the World Wide Web. +aliases: +- /tools/advanced --- Protects against the following threat(s): [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats/index.md#privacy-from-service-providers) diff --git a/content/tools/all/index.md b/content/tools/all/index.md index 14ec4e360..2d3902da5 100644 --- a/content/tools/all/index.md +++ b/content/tools/all/index.md @@ -392,6 +392,8 @@ We [**recommend**](../services/dns/index.md#recommended-providers) a number of e {{< card link="../os/router-firmware/#opnsense" title="OPNsense" image="../os/router-firmware/opnsense.svg" subtitle="OPNsense is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins." >}} {{< /cards >}} +## Advanced + ### Alternative Networks {{< cards >}} diff --git a/content/tools/hardware/_index.md b/content/tools/hardware/_index.md index 139f88820..95d57b108 100644 --- a/content/tools/hardware/_index.md +++ b/content/tools/hardware/_index.md @@ -2,22 +2,7 @@ title: Hardware description: Privacy-focused hardware we recommend, from phones to security keys. weight: 40 +build: + list: local + render: link --- - -## Mobile Phones - -
-{{< cards >}} - {{< card link="mobile-phones/index.md#google-pixel" title="Google Pixel" image="mobile-phones/google-pixel.png" subtitle="Google Pixel phones are the only devices we recommend for purchase. Pixel phones have stronger hardware security than any other Android devices currently on the market, due to proper AVB support for third-party operating systems and Google’s custom Titan security chips acting as the Secure Element." >}} -{{< /cards >}} -
- -## Security Keys - -
-{{< cards >}} - {{< card link="security-keys/index.md#yubico-security-key" title="Yubico Security Key" image="security-keys/yubico-security-key.webp" subtitle="The Yubico Security Key series is the most cost-effective hardware security key with FIDO Level 2 certification. It supports FIDO2/WebAuthn and FIDO Universal 2nd Factor (U2F), and works out of the box with most services that support a security key as a second factor, as well as many password managers." >}} - {{< card link="security-keys/index.md#yubikey" title="YubiKey" image="security-keys/yubikey.png" subtitle="The YubiKey series from Yubico are among the most popular security keys with FIDO Level 2 Certification. The YubiKey 5 Series has a wide range of features such as FIDO2/WebAuthn and FIDO U2F, TOTP and HOTP authentication, Personal Identity Verification (PIV), and OpenPGP." >}} - {{< card link="security-keys/index.md#nitrokey" title="Nitrokey" image="security-keys/nitrokey-square.svg" subtitle="Nitrokey has a cost-effective security key capable of FIDO2/WebAuthn and FIDO U2F called the Nitrokey Passkey. For support for features such as PIV, OpenPGP, and TOTP and HOTP authentication, you need to purchase one of their other keys like the Nitrokey 3. Currently, only the Nitrokey 3A Mini has FIDO Level 1 Certification." >}} -{{< /cards >}} -
diff --git a/content/tools/hardware/mobile-phones/index.md b/content/tools/hardware/mobile-phones/index.md index a2fc72bb6..4750bb0bb 100644 --- a/content/tools/hardware/mobile-phones/index.md +++ b/content/tools/hardware/mobile-phones/index.md @@ -1,6 +1,8 @@ --- title: Mobile Phones description: These mobile devices provide the best hardware security support for custom Android operating systems. +aliases: +- /tools/hardware --- Protects against the following threat(s): [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats/index.md#attacks-against-specific-individuals) diff --git a/content/tools/os/_index.md b/content/tools/os/_index.md index e35f91dc8..f6433429b 100644 --- a/content/tools/os/_index.md +++ b/content/tools/os/_index.md @@ -2,59 +2,7 @@ title: Operating Systems description: Privacy-hardened operating systems and firmware for phones, desktops, and routers. weight: 50 +build: + list: local + render: link --- - -## Custom Android Distributions - -
-{{< cards >}} - {{< card link="android/distributions/index.md#grapheneos" title="GrapheneOS" image="android/distributions/grapheneos.svg" subtitle="GrapheneOS hardens the Android stack on supported Pixels with verified boot, firmware updates, and sandboxed Play." >}} -{{< /cards >}} -
- -## Android General Apps - -
-{{< cards >}} - {{< card link="android/general-apps/index.md#shelter" title="Shelter" image="android/general-apps/shelter.svg" subtitle="Shelter uses a managed work profile to isolate or duplicate apps with optional cross-profile controls." >}} - {{< card link="android/general-apps/index.md#secure-camera" title="Secure Camera" image="android/general-apps/secure_camera.svg" subtitle="Secure Camera captures media with minimal metadata and modern Android storage APIs." >}} - {{< card link="android/general-apps/index.md#secure-pdf-viewer" title="Secure PDF Viewer" image="android/general-apps/secure_pdf_viewer.svg" subtitle="Secure PDF Viewer renders PDFs in a sandboxed WebView without broad file permissions." >}} -{{< /cards >}} -
- -## Obtaining Android Apps - -
-{{< cards >}} - {{< card link="android/obtaining-apps/index.md#obtainium" title="Obtainium" image="android/obtaining-apps/obtainium.svg" subtitle="Obtainium is an app manager which allows you to install and update apps directly from the developer’s own releases page (i.e. GitHub, GitLab, the developer’s website, etc.), rather than a centralized app store/repository." >}} - {{< card link="android/obtaining-apps/index.md#grapheneos-app-store" title="GrapheneOS App Store" subtitle="GrapheneOS’s app store is available on GitHub. It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the Auditor, Camera, and PDF Viewer." >}} - {{< card link="android/obtaining-apps/index.md#aurora-store" title="Aurora Store" image="android/obtaining-apps/aurora-store.webp" subtitle="Aurora Store is a Google Play Store client which does not require a Google account, Google Play Services, or microG to download apps." >}} - {{< card link="android/obtaining-apps/index.md#f-droid" title="F-Droid" image="android/obtaining-apps/f-droid.svg" subtitle="We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above. F-Droid is often recommended as an alternative to Google Play, particularly within the privacy community. The option to add third-party repositories and not be confined to Google’s walled garden has led to its popularity." >}} -{{< /cards >}} -
- -## Desktop/PC - -
-{{< cards >}} - {{< card link="desktop/index.md#fedora-linux" title="Fedora Linux" image="desktop/fedora.svg" subtitle="Fedora Linux is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., Wayland and PipeWire) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general." >}} - {{< card link="desktop/index.md#opensuse-tumbleweed" title="openSUSE Tumbleweed" image="desktop/opensuse-tumbleweed.svg" subtitle="openSUSE Tumbleweed is a stable rolling release distribution. openSUSE Tumbleweed uses Btrfs and Snapper to ensure that snapshots can be rolled back should there be a problem." >}} - {{< card link="desktop/index.md#arch-linux" title="Arch Linux" image="desktop/archlinux.svg" subtitle="Arch Linux is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their FAQ." >}} - {{< card link="desktop/index.md#fedora-atomic-desktops" title="Fedora Atomic Desktops" image="desktop/fedora.svg" subtitle="Fedora Atomic Desktops are variants of Fedora which use the rpm-ostree package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream." >}} - {{< card link="desktop/index.md#nixos" title="NixOS" image="desktop/nixos.svg" subtitle="NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability." >}} - {{< card link="desktop/index.md#whonix" title="Whonix" image="desktop/whonix.svg" subtitle="Whonix is based on Kicksecure, a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with Qubes OS." >}} - {{< card link="desktop/index.md#tails" title="Tails" image="desktop/tails.svg" subtitle="Tails is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses Tor to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off." >}} - {{< card link="desktop/index.md#qubes-os" title="Qubes OS" image="desktop/qubes_os.svg" subtitle="Qubes OS is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or “qubes”). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers." >}} - {{< card link="desktop/index.md#secureblue" title="Secureblue" image="desktop/secureblue.svg" subtitle="Secureblue is a security-focused operating system based on Fedora Atomic Desktops. It includes a number of security features intended to proactively defend against the exploitation of both known and unknown vulnerabilities, and ships with Trivalent, their hardened, Chromium-based web browser." >}} - {{< card link="desktop/index.md#kicksecure" title="Kicksecure" image="desktop/kicksecure.svg" subtitle="Kicksecure—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for Whonix." >}} -{{< /cards >}} -
- -## Router Firmware - -
-{{< cards >}} - {{< card link="router-firmware/index.md#openwrt" title="OpenWrt" image="router-firmware/openwrt.svg" subtitle="OpenWrt is a Linux-based operating system; it’s primarily used on embedded devices to route network traffic. It includes util-linux, uClibc, and BusyBox. All the components have been optimized for home routers." >}} - {{< card link="router-firmware/index.md#opnsense" title="OPNsense" image="router-firmware/opnsense.svg" subtitle="OPNsense is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins." >}} -{{< /cards >}} -
diff --git a/content/tools/os/android/_index.md b/content/tools/os/android/_index.md index cc101a3af..71b96041d 100644 --- a/content/tools/os/android/_index.md +++ b/content/tools/os/android/_index.md @@ -1,6 +1,8 @@ --- title: "Android" description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives. +aliases: +- /tools/os ---